CVE-2026-43363
x2apic Resume Issue in Linux Kernel
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel related to the handling of the x2apic mode during system resume from the S2RAM sleep state. When the system resumes, the firmware may re-enable x2apic mode even if the kernel had disabled it during boot because it does not support IRQ remapping or for other reasons. This mismatch causes the kernel to continue using the older xapic interface while the hardware operates in x2apic mode, leading to system hangs.
The issue happens specifically on systems with default configuration (defconfig), running on bare metal hardware, and resuming from S2RAM. The fix involves disabling x2apic mode during resume if the kernel expects it to be disabled, ensuring consistency between the kernel and hardware states.
How can this vulnerability impact me? :
This vulnerability can cause the system to hang when resuming from the S2RAM sleep state. The hang occurs because the kernel and hardware are out of sync regarding the x2apic mode, which is critical for interrupt handling. Such hangs can lead to system instability, loss of unsaved data, and potential downtime.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by disabling x2apic on resume if the kernel expects it to be disabled. To mitigate this vulnerability, ensure your Linux kernel is updated to a version that includes the fix in lapic_resume() which disables x2apic mode on resume when x2apic_mode is set to 0.
Since the issue occurs when resuming from s2ram and the firmware re-enables x2apic mode, you should avoid using s2ram suspend states on affected systems until the kernel is patched.