CVE-2025-68334
Description
In the Linux kernel, the following vulnerability has been resolved:
platform/x86/amd/pmc: Add support for Van Gogh SoC
The ROG Xbox Ally (non-X) SoC features a similar architecture to the Steam Deck. While the Steam Deck supports S3 (s2idle causes a crash), this support was dropped by the Xbox Ally which only S0ix suspend.
Since the handler is missing here, this causes the device to not suspend and the AMD GPU driver to crash while trying to resume afterwards due to a power hang.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing suspend handler for Van Gogh SoC in AMD PMC driver causes system suspend failure and GPU crash on ROG Ally (non-X).
Vulnerability
Analysis
The Linux kernel's platform/x86/amd/pmc driver lacks support for the Van Gogh SoC, used in devices like the ROG Ally (non-X). This missing architecture-specific handler prevents the system from properly entering the S0ix suspend state, leading to a power hang. When the kernel attempts to resume, the AMD GPU driver crashes because the hardware did not complete the suspend sequence [1].
Exploitation
No special privileges or network access are required—any user capable of initiating system suspend on an affected device (e.g., by closing the lid or pressing the power button) can trigger the bug. The vulnerability exists in the kernel's driver code and is exposed during a normal suspend-resume cycle. Only devices with the Van Gogh SoC are impacted [1].
Impact
An unprivileged local user can cause a denial of service: the system fails to suspend, and upon attempting resume, the AMD GPU driver crashes, potentially leaving the system in an unstable state or requiring a hard reboot. No data leakage or privilege escalation is described [1].
Mitigation
The fix has been applied in the stable kernel tree via commit 9654c56b111c. Users of affected hardware (e.g., ROG Ally non-X) should update to a kernel that includes this commit. No workaround is mentioned in the advisory [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.