Impact
The Linux kernel for s390 processors fails to clear the r12 register when entering kernel mode. A prior commit removed the load of the current task pointer into r12 and the patch that should have scrubbed this value was omitted. The lingering register contents may expose a pointer to the current task, allowing a local attacker to read or infer sensitive kernel data.
Affected Systems
All Linux kernel releases for s390 hardware that do not include the commit adding the r12 register clearing. No specific kernel version numbers are listed in the advisory, so any older kernel lacking the patch is potentially affected.
Risk and Exploitability
The EPSS score of < 1% indicates a low likelihood of exploitation, and the vulnerability is not listed in CISA KEV. Because the flaw involves a register only manipulated during kernel entry, the attack vector is presumably local or requires elevated privileges. The CVSS score of 7.0 classifies this issue as high severity, indicating that an attacker could achieve information disclosure if they can exploit the register leakage.
OpenCVE Enrichment
Debian DSA