Description
In the Linux kernel, the following vulnerability has been resolved:

x86/CPU: Fix FPDSS on Zen1

Zen1's hardware divider can leave, under certain circumstances, partial
results from previous operations. Those results can be leaked by
another, attacker thread.

Fix that with a chicken bit.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Information Disclosure
Action: Apply Update
AI Analysis

Impact

The vulnerability involves Zen1 CPUs, where the hardware divider can leave partial results from previous operations in its state register. Under certain circumstances an attacker thread can read these partial results, leaking sensitive information from other threads. The weakness is an instance of information exposure through partial data (CWE-212). Additionally, NVD lists no further CWE information (marked NVD-CWE-noinfo). The primary impact is the disclosure of memory contents to a local attacker running a competing thread.

Affected Systems

All Linux kernel versions before the commit that introduced the fix for Zen1 CPUs are affected. The affected products are Linux kernels running on systems with Zen1 CPUs. Specific kernel versions are not enumerated in the advisory; any version prior to the patch is considered vulnerable.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate risk. The EPSS score is below 1%, showing a very low exploitation probability in the current threat landscape. The vulnerability is not listed in the CISA KEV catalog. Because the flaw depends on leaking data from a CPU divider, the attack vector is local and requires an attacker thread running on the same system with access to the CPU. No remote or privilege escalation mechanisms are described.

Generated by OpenCVE AI on April 28, 2026 at 13:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a release that includes the FPDSS fix for Zen1 CPUs.
  • Reboot systems so that the updated kernel is loaded and the CPU divider correction is active.
  • If kernel upgrades cannot be performed immediately, consider disabling or removing Zen1 CPUs from the hardware configuration to eliminate the source of partial result leakage.

Generated by OpenCVE AI on April 28, 2026 at 13:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6238-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:4.14:-:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 27 Apr 2026 11:30:00 +0000


Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-212
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: x86/CPU: Fix FPDSS on Zen1 Zen1's hardware divider can leave, under certain circumstances, partial results from previous operations. Those results can be leaked by another, attacker thread. Fix that with a chicken bit.
Title x86/CPU: Fix FPDSS on Zen1
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:29.370Z

Reserved: 2026-03-09T15:48:24.124Z

Link: CVE-2026-31628

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:42.103

Modified: 2026-04-27T20:40:46.773

Link: CVE-2026-31628

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31628 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:00:16Z

Weaknesses