CVE-2026-23354 PUBLISHED

x86/fred: Correct speculative safety in fred_extint()

Assigner: Linux
Reserved: 13.01.2026 Published: 25.03.2026 Updated: 25.03.2026

In the Linux kernel, the following vulnerability has been resolved:

x86/fred: Correct speculative safety in fred_extint()

array_index_nospec() is no use if the result gets spilled to the stack, as it makes the believed safe-under-speculation value subject to memory predictions.

For all practical purposes, this means array_index_nospec() must be used in the expression that accesses the array.

As the code currently stands, it's the wrong side of irqentry_enter(), and 'index' is put into %ebp across the function call.

Remove the index variable and reposition array_index_nospec(), so it's calculated immediately before the array access.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 14619d912b658ecd9573fb88400d3830a29cadcb to 3bc5887b0a2b06d2d9c22f1f4f8500490b3ae643 (excl.)
  • affected from 14619d912b658ecd9573fb88400d3830a29cadcb to e58f1a9b0677de24dcfee0b21393446ec92ff120 (excl.)
  • affected from 14619d912b658ecd9573fb88400d3830a29cadcb to 92caa5274b99cb6729177232a029ce0dfa6c5f7b (excl.)
  • affected from 14619d912b658ecd9573fb88400d3830a29cadcb to aa280a08e7d8fae58557acc345b36b3dc329d595 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.9 is affected
  • unaffected from 0 to 6.9 (excl.)
  • unaffected from 6.12.77 to 6.12.* (incl.)
  • unaffected from 6.18.17 to 6.18.* (incl.)
  • unaffected from 6.19.7 to 6.19.* (incl.)
  • unaffected from 7.0-rc2 to * (incl.)

References