Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: s390/entry: Scrub r12 register on kernel entry Before commit f33f2d4c7c80 ("s390/bp: remove TIF_ISOLATE_BP"), all entry handlers loaded r12 with the current task pointer (lg %r12,__LC_CURRENT) for use by the BPENTER/BPEXIT macros. That commit removed TIF_ISOLATE_BP, dropping both the branch prediction macros and the r12 load, but did not add r12 to the register clearing sequence. Add the missing xgr %r12,%r12 to make the register scrub consistent across all entry points.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.4.1, < 6.6.131 |
References
- https://git.kernel.org/stable/c/0738d395aab8fae3b5a3ad3fc640630c91693c27Patch
- https://git.kernel.org/stable/c/7f4e3233faa8470dd0627bc49b2809f2bfebd909Patch
- https://git.kernel.org/stable/c/95c899cd791803a5bf7b73e5994fbbe1cc1a9c36Patch
- https://git.kernel.org/stable/c/99a8b420f3f0e162eb9c9c9253929d4d23f9bd30Patch
- https://git.kernel.org/stable/c/a58d298a83a3a9b7ca99ded9d60a1e77231159efPatch
FAQ
What is CVE-2026-31482?
CVE-2026-31482 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: s390/entry: Scrub r12 register on kernel entry Before commit f33f2d4c7c80 ("s390/bp: remove TIF_ISOLATE_BP"), all entry handlers l...
How severe is CVE-2026-31482?
CVE-2026-31482 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-31482?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.