CVE-2025-38598

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the AMD GPU driver (amdgpu) in the Linux kernel that occurs during device suspend operations. When exploited, it allows local attackers to potentially execute arbitrary code or cause denial of service. Systems with AMD GPUs running vulnerable Linux kernel versions are affected.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU driver (amdgpu)
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD GPU hardware and the amdgpu driver loaded. Systems without AMD GPUs or with the driver disabled are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, potentially leading to full system compromise.

🟠

Likely Case

Kernel panic or system crash causing denial of service, requiring physical or remote console access to recover.

🟢

If Mitigated

System instability during GPU suspend/resume operations, but no privilege escalation if proper kernel hardening is in place.

🌐 Internet-Facing: LOW - Requires local access to trigger via device suspend operations.
🏢 Internal Only: MEDIUM - Local users or processes with access to GPU management could trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger GPU suspend operations. The vulnerability is in a specific code path during device removal/suspend.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 96f663ae897b3e6ac17ced1d9b9c2ae9f165ad9a and a886d26f2c8f9e3f3c1869ae368d09c75daac553

Vendor Advisory: https://git.kernel.org/stable/c/96f663ae897b3e6ac17ced1d9b9c2ae9f165ad9a

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable GPU suspend/hotplug

linux

Prevent triggering of vulnerable code path by disabling GPU suspend operations

echo 'options amdgpu runtime_pm=0' > /etc/modprobe.d/amdgpu-disable-pm.conf
update-initramfs -u
reboot

Blacklist amdgpu driver

linux

Disable AMD GPU driver entirely if GPU not required

echo 'blacklist amdgpu' > /etc/modprobe.d/blacklist-amdgpu.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable kernels
  • Implement strict access controls to prevent unauthorized users from triggering GPU suspend operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if amdgpu module is loaded: uname -r && lsmod | grep amdgpu

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and check dmesg for absence of KASAN errors during GPU operations

📡 Detection & Monitoring

Log Indicators:

  • KASAN: slab-use-after-free in amdgpu_userq_suspend
  • BUG: KASAN: slab-use-after-free
  • kernel panic during GPU operations

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND "KASAN" AND "amdgpu_userq_suspend"

🔗 References

📤 Share & Export