CVE-2025-39896

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's Intel Versatile Processing Unit (VPU) accelerator driver could allow local attackers to crash the system or potentially execute arbitrary code. This affects systems running vulnerable Linux kernel versions with the ivpu driver loaded. Attackers need local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Linux kernel with Intel VPU (Versatile Processing Unit) driver (accel/ivpu)
Versions: Linux kernel versions containing the vulnerable ivpu driver code before the fix commits
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the ivpu driver is loaded and active. Many systems may not use this driver.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, leading to complete system compromise.

🟠

Likely Case

Kernel panic or system crash causing denial of service.

🟢

If Mitigated

No impact if the ivpu driver is not loaded or the system is patched.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers could crash systems or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of driver state. Timing-dependent exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing commits 54c49eca38dbd06913a696f6d7610937dcfad226, 565d2c15b6c36c3250e694f7b9a86229c1787be5, or 69a79ada8eb034ce016b5b78fb7d08d8687223de

Vendor Advisory: https://git.kernel.org/stable/c/54c49eca38dbd06913a696f6d7610937dcfad226

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load patched kernel. 3. Verify ivpu driver is using disable_work_sync() instead of cancel_work_sync() in ivpu_dev_fini().

🔧 Temporary Workarounds

Unload ivpu driver

linux

Remove the vulnerable driver module if not required

sudo rmmod ivpu

Blacklist ivpu driver

linux

Prevent ivpu driver from loading at boot

echo 'blacklist ivpu' | sudo tee /etc/modprobe.d/blacklist-ivpu.conf
sudo update-initramfs -u

🧯 If You Can't Patch

  • Restrict local access to systems with ivpu driver loaded
  • Monitor for kernel panics or unusual system crashes related to ivpu operations

🔍 How to Verify

Check if Vulnerable:

Check if ivpu driver is loaded: lsmod | grep ivpu. If loaded, check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits. Check driver source for disable_work_sync() usage in ivpu_dev_fini().

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • ivpu driver error messages in dmesg
  • System crashes during device removal

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("ivpu" OR "VPU") AND ("panic" OR "crash" OR "use-after-free")

🔗 References

📤 Share & Export