{"api_version":"1","generated_at":"2026-05-08T18:02:16+00:00","cve":"CVE-2026-43363","urls":{"html":"https://cve.report/CVE-2026-43363","api":"https://cve.report/api/cve/CVE-2026-43363.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43363","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43363"},"summary":{"title":"x86/apic: Disable x2apic on resume if the kernel expects so","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/apic: Disable x2apic on resume if the kernel expects so\n\nWhen resuming from s2ram, firmware may re-enable x2apic mode, which may have\nbeen disabled by the kernel during boot either because it doesn't support IRQ\nremapping or for other reasons. This causes the kernel to continue using the\nxapic interface, while the hardware is in x2apic mode, which causes hangs.\nThis happens on defconfig + bare metal + s2ram.\n\nFix this in lapic_resume() by disabling x2apic if the kernel expects it to be\ndisabled, i.e. when x2apic_mode = 0.\n\nThe ACPI v6.6 spec, Section 16.3 [1] says firmware restores either the\npre-sleep configuration or initial boot configuration for each CPU, including\nMSR state:\n\n  When executing from the power-on reset vector as a result of waking from an\n  S2 or S3 sleep state, the platform firmware performs only the hardware\n  initialization required to restore the system to either the state the\n  platform was in prior to the initial operating system boot, or to the\n  pre-sleep configuration state. In multiprocessor systems, non-boot\n  processors should be placed in the same state as prior to the initial\n  operating system boot.\n\n  (further ahead)\n\n  If this is an S2 or S3 wake, then the platform runtime firmware restores\n  minimum context of the system before jumping to the waking vector. This\n  includes:\n\n\tCPU configuration. Platform runtime firmware restores the pre-sleep\n\tconfiguration or initial boot configuration of each CPU (MSR, MTRR,\n\tfirmware update, SMBase, and so on). Interrupts must be disabled (for\n\tIA-32 processors, disabled by CLI instruction).\n\n\t(and other things)\n\nSo at least as per the spec, re-enablement of x2apic by the firmware is\nallowed if \"x2apic on\" is a part of the initial boot configuration.\n\n  [1] https://uefi.org/specs/ACPI/6.6/16_Waking_and_Sleeping.html#initialization\n\n  [ bp: Massage. ]","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-08 15:16:47","updated_at":"2026-05-08 15:16:47"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/f591938072115bf08730b8530c67fab189cc6308","name":"https://git.kernel.org/stable/c/f591938072115bf08730b8530c67fab189cc6308","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/11712c4eb384098db4cb08792e223c818b908c1a","name":"https://git.kernel.org/stable/c/11712c4eb384098db4cb08792e223c818b908c1a","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/1d8440c1e7c49715f937416ac90cf260f1f1712c","name":"https://git.kernel.org/stable/c/1d8440c1e7c49715f937416ac90cf260f1f1712c","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/3dd0812a7c764cd8f3b0182441ac22da0a7f3b09","name":"https://git.kernel.org/stable/c/3dd0812a7c764cd8f3b0182441ac22da0a7f3b09","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/8cc7dd77a1466f0ec58c03478b2e735a5b289b96","name":"https://git.kernel.org/stable/c/8cc7dd77a1466f0ec58c03478b2e735a5b289b96","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/1a85f84214f9d790216547ac6086bf8033cd9e5a","name":"https://git.kernel.org/stable/c/1a85f84214f9d790216547ac6086bf8033cd9e5a","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/a6ad6f2e31b524cbb66b2f370bad0cf17d327e6c","name":"https://git.kernel.org/stable/c/a6ad6f2e31b524cbb66b2f370bad0cf17d327e6c","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/965289b120cc68cca886c75219c68b8c15751d73","name":"https://git.kernel.org/stable/c/965289b120cc68cca886c75219c68b8c15751d73","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43363","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43363","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6e1cb38a2aef7680975e71f23de187859ee8b158 a6ad6f2e31b524cbb66b2f370bad0cf17d327e6c git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6e1cb38a2aef7680975e71f23de187859ee8b158 3dd0812a7c764cd8f3b0182441ac22da0a7f3b09 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6e1cb38a2aef7680975e71f23de187859ee8b158 965289b120cc68cca886c75219c68b8c15751d73 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6e1cb38a2aef7680975e71f23de187859ee8b158 f591938072115bf08730b8530c67fab189cc6308 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6e1cb38a2aef7680975e71f23de187859ee8b158 1a85f84214f9d790216547ac6086bf8033cd9e5a git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6e1cb38a2aef7680975e71f23de187859ee8b158 11712c4eb384098db4cb08792e223c818b908c1a git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6e1cb38a2aef7680975e71f23de187859ee8b158 1d8440c1e7c49715f937416ac90cf260f1f1712c git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6e1cb38a2aef7680975e71f23de187859ee8b158 8cc7dd77a1466f0ec58c03478b2e735a5b289b96 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 2.6.28","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 2.6.28 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10.253 5.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.203 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.167 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.130 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.78 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.19 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.9 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["arch/x86/kernel/apic/apic.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"a6ad6f2e31b524cbb66b2f370bad0cf17d327e6c","status":"affected","version":"6e1cb38a2aef7680975e71f23de187859ee8b158","versionType":"git"},{"lessThan":"3dd0812a7c764cd8f3b0182441ac22da0a7f3b09","status":"affected","version":"6e1cb38a2aef7680975e71f23de187859ee8b158","versionType":"git"},{"lessThan":"965289b120cc68cca886c75219c68b8c15751d73","status":"affected","version":"6e1cb38a2aef7680975e71f23de187859ee8b158","versionType":"git"},{"lessThan":"f591938072115bf08730b8530c67fab189cc6308","status":"affected","version":"6e1cb38a2aef7680975e71f23de187859ee8b158","versionType":"git"},{"lessThan":"1a85f84214f9d790216547ac6086bf8033cd9e5a","status":"affected","version":"6e1cb38a2aef7680975e71f23de187859ee8b158","versionType":"git"},{"lessThan":"11712c4eb384098db4cb08792e223c818b908c1a","status":"affected","version":"6e1cb38a2aef7680975e71f23de187859ee8b158","versionType":"git"},{"lessThan":"1d8440c1e7c49715f937416ac90cf260f1f1712c","status":"affected","version":"6e1cb38a2aef7680975e71f23de187859ee8b158","versionType":"git"},{"lessThan":"8cc7dd77a1466f0ec58c03478b2e735a5b289b96","status":"affected","version":"6e1cb38a2aef7680975e71f23de187859ee8b158","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["arch/x86/kernel/apic/apic.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"2.6.28"},{"lessThan":"2.6.28","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.10.*","status":"unaffected","version":"5.10.253","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.203","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.167","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.130","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.78","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.19","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.9","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.253","versionStartIncluding":"2.6.28","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.203","versionStartIncluding":"2.6.28","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.167","versionStartIncluding":"2.6.28","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.130","versionStartIncluding":"2.6.28","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.78","versionStartIncluding":"2.6.28","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.19","versionStartIncluding":"2.6.28","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.9","versionStartIncluding":"2.6.28","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"2.6.28","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/apic: Disable x2apic on resume if the kernel expects so\n\nWhen resuming from s2ram, firmware may re-enable x2apic mode, which may have\nbeen disabled by the kernel during boot either because it doesn't support IRQ\nremapping or for other reasons. This causes the kernel to continue using the\nxapic interface, while the hardware is in x2apic mode, which causes hangs.\nThis happens on defconfig + bare metal + s2ram.\n\nFix this in lapic_resume() by disabling x2apic if the kernel expects it to be\ndisabled, i.e. when x2apic_mode = 0.\n\nThe ACPI v6.6 spec, Section 16.3 [1] says firmware restores either the\npre-sleep configuration or initial boot configuration for each CPU, including\nMSR state:\n\n  When executing from the power-on reset vector as a result of waking from an\n  S2 or S3 sleep state, the platform firmware performs only the hardware\n  initialization required to restore the system to either the state the\n  platform was in prior to the initial operating system boot, or to the\n  pre-sleep configuration state. In multiprocessor systems, non-boot\n  processors should be placed in the same state as prior to the initial\n  operating system boot.\n\n  (further ahead)\n\n  If this is an S2 or S3 wake, then the platform runtime firmware restores\n  minimum context of the system before jumping to the waking vector. This\n  includes:\n\n\tCPU configuration. Platform runtime firmware restores the pre-sleep\n\tconfiguration or initial boot configuration of each CPU (MSR, MTRR,\n\tfirmware update, SMBase, and so on). Interrupts must be disabled (for\n\tIA-32 processors, disabled by CLI instruction).\n\n\t(and other things)\n\nSo at least as per the spec, re-enablement of x2apic by the firmware is\nallowed if \"x2apic on\" is a part of the initial boot configuration.\n\n  [1] https://uefi.org/specs/ACPI/6.6/16_Waking_and_Sleeping.html#initialization\n\n  [ bp: Massage. ]"}],"providerMetadata":{"dateUpdated":"2026-05-08T14:21:16.986Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/a6ad6f2e31b524cbb66b2f370bad0cf17d327e6c"},{"url":"https://git.kernel.org/stable/c/3dd0812a7c764cd8f3b0182441ac22da0a7f3b09"},{"url":"https://git.kernel.org/stable/c/965289b120cc68cca886c75219c68b8c15751d73"},{"url":"https://git.kernel.org/stable/c/f591938072115bf08730b8530c67fab189cc6308"},{"url":"https://git.kernel.org/stable/c/1a85f84214f9d790216547ac6086bf8033cd9e5a"},{"url":"https://git.kernel.org/stable/c/11712c4eb384098db4cb08792e223c818b908c1a"},{"url":"https://git.kernel.org/stable/c/1d8440c1e7c49715f937416ac90cf260f1f1712c"},{"url":"https://git.kernel.org/stable/c/8cc7dd77a1466f0ec58c03478b2e735a5b289b96"}],"title":"x86/apic: Disable x2apic on resume if the kernel expects so","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43363","datePublished":"2026-05-08T14:21:16.986Z","dateReserved":"2026-05-01T14:12:56.005Z","dateUpdated":"2026-05-08T14:21:16.986Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 15:16:47","lastModifiedDate":"2026-05-08 15:16:47","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43363","Ordinal":"1","Title":"x86/apic: Disable x2apic on resume if the kernel expects so","CVE":"CVE-2026-43363","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43363","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/apic: Disable x2apic on resume if the kernel expects so\n\nWhen resuming from s2ram, firmware may re-enable x2apic mode, which may have\nbeen disabled by the kernel during boot either because it doesn't support IRQ\nremapping or for other reasons. This causes the kernel to continue using the\nxapic interface, while the hardware is in x2apic mode, which causes hangs.\nThis happens on defconfig + bare metal + s2ram.\n\nFix this in lapic_resume() by disabling x2apic if the kernel expects it to be\ndisabled, i.e. when x2apic_mode = 0.\n\nThe ACPI v6.6 spec, Section 16.3 [1] says firmware restores either the\npre-sleep configuration or initial boot configuration for each CPU, including\nMSR state:\n\n  When executing from the power-on reset vector as a result of waking from an\n  S2 or S3 sleep state, the platform firmware performs only the hardware\n  initialization required to restore the system to either the state the\n  platform was in prior to the initial operating system boot, or to the\n  pre-sleep configuration state. In multiprocessor systems, non-boot\n  processors should be placed in the same state as prior to the initial\n  operating system boot.\n\n  (further ahead)\n\n  If this is an S2 or S3 wake, then the platform runtime firmware restores\n  minimum context of the system before jumping to the waking vector. This\n  includes:\n\n\tCPU configuration. Platform runtime firmware restores the pre-sleep\n\tconfiguration or initial boot configuration of each CPU (MSR, MTRR,\n\tfirmware update, SMBase, and so on). Interrupts must be disabled (for\n\tIA-32 processors, disabled by CLI instruction).\n\n\t(and other things)\n\nSo at least as per the spec, re-enablement of x2apic by the firmware is\nallowed if \"x2apic on\" is a part of the initial boot configuration.\n\n  [1] https://uefi.org/specs/ACPI/6.6/16_Waking_and_Sleeping.html#initialization\n\n  [ bp: Massage. ]","Type":"Description","Title":"x86/apic: Disable x2apic on resume if the kernel expects so"}]}}}