CVE-2026-23354

Source
https://cve.org/CVERecord?id=CVE-2026-23354
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23354.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23354
Downstream
Published
2026-03-25T10:27:38.825Z
Modified
2026-04-02T13:12:22.666645Z
Summary
x86/fred: Correct speculative safety in fred_extint()
Details

In the Linux kernel, the following vulnerability has been resolved:

x86/fred: Correct speculative safety in fred_extint()

arrayindexnospec() is no use if the result gets spilled to the stack, as it makes the believed safe-under-speculation value subject to memory predictions.

For all practical purposes, this means arrayindexnospec() must be used in the expression that accesses the array.

As the code currently stands, it's the wrong side of irqentry_enter(), and 'index' is put into %ebp across the function call.

Remove the index variable and reposition arrayindexnospec(), so it's calculated immediately before the array access.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23354.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
14619d912b658ecd9573fb88400d3830a29cadcb
Fixed
3bc5887b0a2b06d2d9c22f1f4f8500490b3ae643
Fixed
e58f1a9b0677de24dcfee0b21393446ec92ff120
Fixed
92caa5274b99cb6729177232a029ce0dfa6c5f7b
Fixed
aa280a08e7d8fae58557acc345b36b3dc329d595

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23354.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.12.77
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23354.json"