CVE-2025-38506

5.5 MEDIUM

📋 TL;DR

A denial-of-service vulnerability in the Linux kernel's KVM hypervisor allows attackers to cause CPU soft lockups when running SEV-SNP guests with large memory allocations (1TB+). This affects Linux systems using KVM virtualization with AMD SEV-SNP enabled, potentially causing host instability and service disruption.

💻 Affected Systems

Products:
  • Linux Kernel KVM module
Versions: Kernel versions up to and including 6.15.0-rc7 (specifically mentioned in stack trace), likely affects earlier versions with similar code.
Operating Systems: Linux distributions with KVM support and AMD SEV-SNP capability
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when running SEV-SNP guests with very large memory allocations (1TB+). Requires AMD EPYC processors with SEV-SNP support and KVM configured for SEV-SNP.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete host CPU lockup requiring hard reboot, causing downtime for all VMs on the affected host.

🟠

Likely Case

Host becomes unresponsive or experiences severe performance degradation when specific memory operations are performed on large SEV-SNP guests.

🟢

If Mitigated

Minor performance impact with proper scheduling, no security bypass or data compromise.

🌐 Internet-Facing: LOW - Requires access to KVM management interface and ability to configure large SEV-SNP guests.
🏢 Internal Only: MEDIUM - Malicious or misconfigured internal users with KVM privileges could trigger host instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires KVM management privileges and ability to create/configure large SEV-SNP guests. Not a remote code execution or privilege escalation vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits: 1ef45ae7a3938f0844032ba670b4f89180a5bffc, 47bb584237cc285e3a860b70c01f7bda9dcfb05b, d9bd1163c8d8f716f45e54d034ee28757cc85549

Vendor Advisory: https://git.kernel.org/stable/c/1ef45ae7a3938f0844032ba670b4f89180a5bffc

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check kernel version with 'uname -r'. 3. Reboot system after kernel update. 4. Verify fix by checking kernel version matches patched release.

🔧 Temporary Workarounds

Limit SEV-SNP guest memory

all

Configure SEV-SNP guests with less than 1TB of memory to avoid triggering the soft lockup condition.

# Configure VM with less than 1TB RAM in libvirt/qemu configuration

Disable SEV-SNP for large guests

all

Use standard encryption or no encryption for guests requiring large memory allocations.

# Disable SEV-SNP in VM configuration: <sev> section removal or <policy>0</policy>

🧯 If You Can't Patch

  • Monitor host CPU usage and watch for soft lockup messages in kernel logs
  • Implement strict access controls to KVM management interfaces

🔍 How to Verify

Check if Vulnerable:

Check kernel version with 'uname -r' and verify if running vulnerable version with SEV-SNP enabled. Check dmesg for soft lockup messages during large memory operations.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable versions. Test with large SEV-SNP guest memory operations and monitor for soft lockups.

📡 Detection & Monitoring

Log Indicators:

  • kernel: watchdog: BUG: soft lockup - CPU# stuck for
  • kernel: qemu-kvm process stuck in kvm_vm_set_mem_attributes
  • kernel: CPU soft lockup messages with KVM/SEV-SNP context

Network Indicators:

  • None - this is a local host vulnerability

SIEM Query:

source="kernel" AND "soft lockup" AND ("qemu-kvm" OR "KVM" OR "SEV-SNP")

🔗 References

📤 Share & Export