CVE-2025-38056

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's Sound Open Firmware (SOF) Intel HDA driver allows attackers to potentially crash the system or execute arbitrary code when the affected module is reloaded. This affects Linux systems using Intel HDA audio hardware with the snd_sof_intel_hda_generic module. The vulnerability requires local access to trigger.

💻 Affected Systems

Products:
  • Linux kernel with SOF Intel HDA audio support
Versions: Kernel versions containing the vulnerable code up to the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel HDA audio hardware and the snd_sof_intel_hda_generic module to be loaded.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service, or potential privilege escalation to kernel-level code execution if combined with other vulnerabilities.

🟠

Likely Case

System crash or kernel panic when the affected audio driver module is reloaded, causing denial of service.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized module loading/unloading.

🌐 Internet-Facing: LOW - Requires local access to trigger the module reload.
🏢 Internal Only: MEDIUM - Local users or processes with module loading privileges could trigger the crash.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to load/unload kernel modules. The vulnerability triggers during module reload sequence.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 2b49e68360eb6a1c03dc1642a51f7d9f6784c034, 7dd7f39fce0022b386ef1ea5ffef92ecc7dfc6af, or f9670b2e81e8a3cbf2e1e757190dd0b920a9d43f

Vendor Advisory: https://git.kernel.org/stable/c/2b49e68360eb6a1c03dc1642a51f7d9f6784c034

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load patched kernel. 3. Verify the snd_sof_intel_hda_generic module loads without errors.

🔧 Temporary Workarounds

Prevent module unloading

linux

Set module parameters to prevent unloading of the affected audio driver

echo 0 > /sys/module/snd_sof_intel_hda_generic/parameters/allow_unload

Blacklist vulnerable module

linux

Prevent loading of the vulnerable module entirely

echo 'blacklist snd_sof_intel_hda_generic' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Restrict module loading privileges using capabilities or SELinux/AppArmor policies
  • Monitor for unauthorized module loading/unloading activities

🔍 How to Verify

Check if Vulnerable:

Check if snd_sof_intel_hda_generic module is loaded: lsmod | grep snd_sof_intel_hda_generic

Check Version:

uname -r

Verify Fix Applied:

Check kernel version contains fix commits: uname -r and verify against patched versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KFENCE use-after-free errors in dmesg
  • Module loading/unloading events in system logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("use-after-free" OR "KFENCE" OR "snd_sof_intel_hda_generic")

🔗 References

📤 Share & Export