CVE-2025-38598
📋 TL;DR
This is a use-after-free vulnerability in the AMD GPU driver (amdgpu) in the Linux kernel that occurs during device suspend operations. When exploited, it allows local attackers to potentially execute arbitrary code or cause denial of service. Systems with AMD GPUs running vulnerable Linux kernel versions are affected.
💻 Affected Systems
- Linux kernel with AMD GPU driver (amdgpu)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to kernel-level code execution, potentially leading to full system compromise.
Likely Case
Kernel panic or system crash causing denial of service, requiring physical or remote console access to recover.
If Mitigated
System instability during GPU suspend/resume operations, but no privilege escalation if proper kernel hardening is in place.
🎯 Exploit Status
Requires local access and ability to trigger GPU suspend operations. The vulnerability is in a specific code path during device removal/suspend.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits 96f663ae897b3e6ac17ced1d9b9c2ae9f165ad9a and a886d26f2c8f9e3f3c1869ae368d09c75daac553
Vendor Advisory: https://git.kernel.org/stable/c/96f663ae897b3e6ac17ced1d9b9c2ae9f165ad9a
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable GPU suspend/hotplug
linuxPrevent triggering of vulnerable code path by disabling GPU suspend operations
echo 'options amdgpu runtime_pm=0' > /etc/modprobe.d/amdgpu-disable-pm.conf
update-initramfs -u
reboot
Blacklist amdgpu driver
linuxDisable AMD GPU driver entirely if GPU not required
echo 'blacklist amdgpu' > /etc/modprobe.d/blacklist-amdgpu.conf
update-initramfs -u
reboot
🧯 If You Can't Patch
- Restrict local user access to systems with vulnerable kernels
- Implement strict access controls to prevent unauthorized users from triggering GPU suspend operations
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if amdgpu module is loaded: uname -r && lsmod | grep amdgpu
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched and check dmesg for absence of KASAN errors during GPU operations
📡 Detection & Monitoring
Log Indicators:
- KASAN: slab-use-after-free in amdgpu_userq_suspend
- BUG: KASAN: slab-use-after-free
- kernel panic during GPU operations
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND "KASAN" AND "amdgpu_userq_suspend"