CVE-2026-23128
CFI Bypass in Linux arm64 swsusp Causes Kernel Data Abort
Publication date: 2026-02-14
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.8 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.1 (inc) to 6.1.162 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel on arm64 architecture related to the swsusp_arch_resume() function used during system resume from hibernation on Android-based systems.
A Data Abort (DABT) error happens because the function swsusp_arch_suspend_exit() is marked in a way that it does not have a Control Flow Integrity (CFI) hash, but swsusp_arch_resume() tries to verify this CFI hash when calling a copy of swsusp_arch_suspend_exit().
The root cause is that swsusp_arch_suspend_exit() must remain marked as SYM_CODE_*() due to its entry point requirements, so the fix was to disable the CFI check in swsusp_arch_resume() by marking it as __nocfi.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (Data Abort) during the resume from hibernation on affected systems, potentially leading to system instability or denial of service.
On Android-based devices using affected Linux kernel versions, this could result in unexpected reboots or inability to properly resume from hibernation, impacting device availability and reliability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a Data Abort (DABT) error on an Android-based system when resuming from hibernate. The kernel logs will show messages similar to "Unable to handle kernel paging request" and an internal error related to swsusp_arch_resume().
To detect this vulnerability on your system, you should monitor kernel logs for such errors during resume from hibernation.
- Use the command: dmesg | grep -i 'swsusp_arch_resume' to check for related kernel errors.
- Check for kernel paging request errors with: dmesg | grep -i 'Unable to handle kernel paging request'
- Look for Data Abort (DABT) messages in kernel logs: dmesg | grep -i 'DABT'
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by marking the function swsusp_arch_resume() with __nocfi to disable the Control Flow Integrity (CFI) check.
Immediate mitigation involves updating your Linux kernel to a version that includes this fix.
If updating is not immediately possible, avoid using hibernation on affected systems as the issue occurs during resume from hibernate.