| Summary | In the Linux kernel, the following vulnerability has been resolved: x86/cpu: Remove X86_CR4_FRED from the CR4 pinned bits mask Commit in Fixes added the FRED CR4 bit to the CR4 pinned bits mask so However, there's an issue when during boot FRED is initialized: first on This becomes particularly nasty when running as SEV-{ES,SNP} or TDX See Link tag below for a much more detailed explanation of the So, as a result, the commit in that Link URL tried to address this However, that is a problem in itself because in this case, an attack on So, instead, remove the FRED bit from the CR4 pinning mask, thus If someone manages to disable FRED when poking at CR4, then |
|---|---|
| Publication Date | April 25, 2026, 12:16 a.m. |
| Registration Date | April 25, 2026, 4:07 a.m. |
| Last Update | April 25, 2026, 2:51 a.m. |