Impact
During a resume from S2RAM, the firmware may re‑enable the x2apic mode that the kernel had disabled at boot due to lack of IRQ remapping support. When the kernel continues to operate using the xapic interface while the hardware is in x2apic mode, the kernel attempts to use an unsupported interface and stalls, causing a system hang. This flaw involves improper state handling at the hardware/firmware boundary and can be classified as a runtime configuration inconsistency.
Affected Systems
Linux kernel – all builds using the default configuration on bare metal systems that employ S2RAM sleep and resume. No specific version range is provided in the public data, so all affected branches are potentially impacted until the described patch is applied.
Risk and Exploitability
The EPSS score is unavailable and the vulnerability is not listed in CISA’s KEV catalog, indicating no known widely deployed exploits. Because the flaw manifests only when the firmware restores the CPU configuration during a wake event, an attacker would need to trigger a resume or manipulate firmware behaviour. The impact is local (system stall) rather than remote code execution. The CVSS score is 5.5, reflecting a moderate severity; this suggests the risk is moderate but still causes a denial of service that can stall the system.
OpenCVE Enrichment