๐Ÿ” CVE Alert

CVE-2026-31561

UNKNOWN 0.0

x86/cpu: Remove X86_CR4_FRED from the CR4 pinned bits mask

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: x86/cpu: Remove X86_CR4_FRED from the CR4 pinned bits mask Commit in Fixes added the FRED CR4 bit to the CR4 pinned bits mask so that whenever something else modifies CR4, that bit remains set. Which in itself is a perfectly fine idea. However, there's an issue when during boot FRED is initialized: first on the BSP and later on the APs. Thus, there's a window in time when exceptions cannot be handled. This becomes particularly nasty when running as SEV-{ES,SNP} or TDX guests which, when they manage to trigger exceptions during that short window described above, triple fault due to FRED MSRs not being set up yet. See Link tag below for a much more detailed explanation of the situation. So, as a result, the commit in that Link URL tried to address this shortcoming by temporarily disabling CR4 pinning when an AP is not online yet. However, that is a problem in itself because in this case, an attack on the kernel needs to only modify the online bit - a single bit in RW memory - and then disable CR4 pinning and then disable SM*P, leading to more and worse things to happen to the system. So, instead, remove the FRED bit from the CR4 pinning mask, thus obviating the need to temporarily disable CR4 pinning. If someone manages to disable FRED when poking at CR4, then idt_invalidate() would make sure the system would crash'n'burn on the first exception triggered, which is a much better outcome security-wise.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ff45746fbf005f96e42bea466698e3fdbf926013 < d7853d9fe94abf43b46c57b0b7f8418198b7615a ff45746fbf005f96e42bea466698e3fdbf926013 < a6e14114684d2324e5401617d6d01acb4a4e0e22 ff45746fbf005f96e42bea466698e3fdbf926013 < 00d956dafa76f86a73424fe5cce3d604a8be2e4b ff45746fbf005f96e42bea466698e3fdbf926013 < 411df123c017169922cc767affce76282b8e6c85
Linux / Linux
6.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d7853d9fe94abf43b46c57b0b7f8418198b7615a git.kernel.org: https://git.kernel.org/stable/c/a6e14114684d2324e5401617d6d01acb4a4e0e22 git.kernel.org: https://git.kernel.org/stable/c/00d956dafa76f86a73424fe5cce3d604a8be2e4b git.kernel.org: https://git.kernel.org/stable/c/411df123c017169922cc767affce76282b8e6c85