Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Linux Kernel: Potential Data Corruption on Unsupported ARM Systems

UBUNTU-CVE-2026-23114
Summary

A previously fixed vulnerability in the Linux kernel could cause data corruption on ARM systems that support SVE but not SME. This issue is now resolved and poses no functional problems, but may trigger a warning message. No action is required for non-technical users, but administrators should be aware of the fix.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
canonical linux-hwe-edge All versions
canonical linux-aws-5.0 All versions
canonical linux-aws-5.3 All versions
canonical linux-azure All versions
canonical linux-azure-5.3 All versions
canonical linux-azure-edge All versions
canonical linux-gcp All versions
canonical linux-gcp-5.3 All versions
canonical linux-gke-4.15 All versions
canonical linux-gke-5.4 All versions
canonical linux-gkeop-5.4 All versions
canonical linux-hwe All versions
canonical linux-hwe-edge All versions
canonical linux-oem All versions
canonical linux-oracle-5.0 All versions
canonical linux-oracle-5.3 All versions
canonical linux-aws-5.11 All versions
canonical linux-aws-5.13 All versions
canonical linux-aws-5.8 All versions
canonical linux-azure-5.11 All versions
canonical linux-azure-5.13 All versions
canonical linux-azure-5.8 All versions
canonical linux-azure-fde All versions
canonical linux-gcp-5.11 All versions
canonical linux-gcp-5.13 All versions
canonical linux-gcp-5.8 All versions
canonical linux-gke All versions
canonical linux-gke-5.15 All versions
canonical linux-gkeop All versions
canonical linux-gkeop-5.15 All versions
canonical linux-hwe-5.11 All versions
canonical linux-hwe-5.13 All versions
canonical linux-hwe-5.8 All versions
canonical linux-intel-5.13 All versions
canonical linux-oem-5.10 All versions
canonical linux-oem-5.13 All versions
canonical linux-oem-5.14 All versions
canonical linux-oem-5.6 All versions
canonical linux-oracle-5.11 All versions
canonical linux-oracle-5.13 All versions
canonical linux-oracle-5.8 All versions
canonical linux-raspi2 All versions
canonical linux-riscv All versions
canonical linux-riscv-5.11 All versions
canonical linux-riscv-5.8 All versions
canonical linux-allwinner-5.19 All versions
canonical linux-aws-5.19 All versions
canonical linux-aws-6.2 All versions
canonical linux-aws-6.5 All versions
canonical linux-azure-5.19 All versions
canonical linux-azure-6.2 All versions
canonical linux-azure-6.5 All versions
canonical linux-azure-fde-5.19 All versions
canonical linux-azure-fde-6.2 All versions
canonical linux-gcp-5.19 All versions
canonical linux-gcp-6.2 All versions
canonical linux-gcp-6.5 All versions
canonical linux-hwe-5.19 All versions
canonical linux-hwe-6.2 All versions
canonical linux-hwe-6.5 All versions
canonical linux-intel-iot-realtime All versions
canonical linux-lowlatency-hwe-5.19 All versions
canonical linux-lowlatency-hwe-6.2 All versions
canonical linux-lowlatency-hwe-6.5 All versions
canonical linux-nvidia-6.2 All versions
canonical linux-nvidia-6.5 All versions
canonical linux-oem-5.17 All versions
canonical linux-oem-6.0 All versions
canonical linux-oem-6.1 All versions
canonical linux-oem-6.5 All versions
canonical linux-oracle-6.5 All versions
canonical linux-realtime All versions
canonical linux-riscv All versions
canonical linux-riscv-5.19 All versions
canonical linux-riscv-6.5 All versions
canonical linux-starfive-5.19 All versions
canonical linux-starfive-6.2 All versions
canonical linux-starfive-6.5 All versions
canonical linux-aws-6.17 All versions
canonical linux-azure-6.11 All versions
canonical linux-azure-6.17 All versions
canonical linux-azure-fde-6.17 All versions
canonical linux-gcp-6.11 All versions
canonical linux-gcp-6.17 All versions
canonical linux-hwe-6.11 All versions
canonical linux-hwe-6.17 All versions
canonical linux-lowlatency-hwe-6.11 All versions
canonical linux-nvidia-6.11 All versions
canonical linux-oem-6.11 All versions
canonical linux-oem-6.17 All versions
canonical linux-oem-6.8 All versions
canonical linux-oracle-6.14 All versions
canonical linux-oracle-6.17 All versions
canonical linux-raspi-realtime All versions
canonical linux-realtime All versions
canonical linux-riscv All versions
canonical linux-riscv-6.14 All versions
canonical linux-riscv-6.17 All versions
canonical linux-realtime-6.14 All versions
canonical linux All versions
canonical linux-aws All versions
canonical linux-azure All versions
canonical linux-azure-fde All versions
canonical linux-gcp All versions
canonical linux-oracle All versions
canonical linux-raspi All versions
canonical linux-realtime All versions
canonical linux-riscv All versions
Original title
In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE writes on !SME systems When SVE is supported but SME is not supported, a ptrace write to the NT_ARM...
Original description
In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE writes on !SME systems When SVE is supported but SME is not supported, a ptrace write to the NT_ARM_SVE regset can place the tracee into an invalid state where (non-streaming) SVE register data is stored in FP_STATE_SVE format but TIF_SVE is clear. This can result in a later warning from fpsimd_restore_current_state(), e.g. WARNING: CPU: 0 PID: 7214 at arch/arm64/kernel/fpsimd.c:383 fpsimd_restore_current_state+0x50c/0x748 When this happens, fpsimd_restore_current_state() will set TIF_SVE, placing the task into the correct state. This occurs before any other check of TIF_SVE can possibly occur, as other checks of TIF_SVE only happen while the FPSIMD/SVE/SME state is live. Thus, aside from the warning, there is no functional issue. This bug was introduced during rework to error handling in commit: 9f8bf718f2923 ("arm64/fpsimd: ptrace: Gracefully handle errors") ... where the setting of TIF_SVE was moved into a block which is only executed when system_supports_sme() is true. Fix this by removing the system_supports_sme() check. This ensures that TIF_SVE is set for (SVE-formatted) writes to NT_ARM_SVE, at the cost of unconditionally manipulating the tracee's saved svcr value. The manipulation of svcr is benign and inexpensive, and we already do similar elsewhere (e.g. during signal handling), so I don't think it's worth guarding this with system_supports_sme() checks. Aside from the above, there is no functional change. The 'type' argument to sve_set_common() is only set to ARM64_VEC_SME (in ssve_set())) when system_supports_sme(), so the ARM64_VEC_SME case in the switch statement is still unreachable when !system_supports_sme(). When CONFIG_ARM64_SME=n, the only caller of sve_set_common() is sve_set(), and the compiler can constant-fold for the case where type is ARM64_VEC_SVE, removing the logic for other cases.
Published: 14 Feb 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026