CVE-2026-31628
Description
In the Linux kernel, the following vulnerability has been resolved:
x86/CPU: Fix FPDSS on Zen1
Zen1's hardware divider can leave, under certain circumstances, partial results from previous operations. Those results can be leaked by another, attacker thread.
Fix that with a chicken bit.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Zen1 CPU hardware divider can leak partial results to attacker threads; Linux kernel fix adds a chicken bit.
Vulnerability
The Linux kernel has addressed a vulnerability in the x86 CPU subsystem affecting AMD Zen1 processors. The hardware divider on Zen1 CPUs, under certain circumstances, leaves partial results from previous operations [1]. This residual data can be observed by another thread running on the same CPU core, leading to a side-channel information leak.
Exploitation
An attacker with local access to the system can run a malicious thread on the same CPU core as a victim thread. By carefully timing or analyzing the divider's residual state, the attacker can infer sensitive information from the victim's computations. No special privileges beyond user-level code execution are required, making this a practical concern for multi-tenant environments or cloud instances sharing physical cores.
Impact
The vulnerability allows an attacker to potentially leak sensitive data such as cryptographic keys, passwords, or other confidential information processed by other threads. The CVSS v3 base score of 5.5 (Medium) reflects the need for local access and the context-dependent nature of the leak, but the consequences could be severe in shared computing scenarios.
Mitigation
The fix, referred to as a "chicken bit," clears the divider's residual state to prevent leakage. Patches have been applied to the Linux kernel stable tree [1]. Users are advised to update their kernels to the latest patched version to mitigate this issue.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- git.kernel.org/stable/c/0548529af20e68c6552817834b766646dd3bd7a7nvdPatch
- git.kernel.org/stable/c/1272cfedf4cd1019ddf583917a99b62f2d3645bbnvdPatch
- git.kernel.org/stable/c/546785c719418c6166834a47e372a88f5f7ae893nvdPatch
- git.kernel.org/stable/c/91f02726b2203b71545713ecb7fb006e60a2d66fnvdPatch
- git.kernel.org/stable/c/ad17f07e95e6e8505e2153e5b391f0d27eacce25nvdPatch
- git.kernel.org/stable/c/b731aca06387b195058a9f6449a03b62efa1bd10nvdPatch
- git.kernel.org/stable/c/e55d98e7756135f32150b9b8f75d580d0d4b2dd3nvdPatch
- git.kernel.org/stable/c/e6af5286efe5a56128b34032572c9ce9ebeccda3nvdPatch
- git.kernel.org/stable/c/ed7a3a246309ccc807238f1b4f159ee6d37ff9c4nvdPatch
News mentions
0No linked articles in our index yet.