Impact
When an arm64 device resumes from hibernation, the swsusp_arch_resume function verifies a control‑flow integrity hash that was not generated for its counterpart suspending routine. Because the CFI hash is missing, the verification generates a data abort that crashes the kernel. The flaw does not enable arbitrary code execution; it simply causes the system to panic, leading to a denial of service.
Affected Systems
The issue exists in Linux kernel arm64 builds that contain the swsusp architecture code, notably Android kernels compiled from source. The CPE list shows that kernel series 6.6 and 6.19, including release candidates, contain the unpatched code. Any distribution or custom build that relies on that portion of the kernel without applying the fix is potentially exposed.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity and the EPSS score of less than 1 % suggests a low likelihood of exploitation. The vulnerability does not compromise confidentiality or integrity; its primary risk is availability, as an attacker with local or physical access could trigger hibernation, causing repeated crashes. The flaw is not listed in the CISA KEV catalog and no exploitation reports exist, indicating that mitigations should focus on patching rather than preventing third‑party attacks.
OpenCVE Enrichment
Ubuntu USN