CVE-2025-22011: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ARM: dts: bcm2711: Fix xHCI power-domain During s2idle tests on the Raspberry CM4 the VPU firmware always crashes on xHCI power-domain resume: root@raspberrypi:/sys/power# echo freeze > state [ 70.724347] xhci_suspend finished [ 70.727730] xhci_plat_suspend finished [ 70.755624] bcm2835-power bcm2835-power: Power grafx off [ 70.761127] USB: Set power to 0 [ 74.653040] USB: Failed to set power to 1 (-110) This seems to be caused because of the mixed usage of raspberrypi-power and bcm2835-power at the same time. So avoid the usage of the VPU firmware power-domain driver, which prevents the VPU crash.
AI Analysis
Technical Summary
CVE-2025-22011 is a vulnerability identified in the Linux kernel specifically affecting the ARM architecture implementation on the Raspberry Pi Compute Module 4 (CM4). The issue arises from the improper handling of power domains related to the USB 3.0 xHCI controller and the Video Processing Unit (VPU) firmware during system suspend and resume cycles, particularly when using the s2idle (suspend-to-idle) power state. The root cause is the mixed usage of two power domain drivers: raspberrypi-power and bcm2835-power, which leads to conflicts in power management. During resume from s2idle, the VPU firmware crashes because the xHCI power domain is not correctly restored, as evidenced by kernel logs showing failure to set USB power back on (error -110). This improper power domain management can cause system instability or failure of USB devices to resume correctly after suspend. The vulnerability is addressed by avoiding the simultaneous use of these conflicting power domain drivers, effectively preventing the VPU crash. The affected Linux kernel versions are identified by a specific commit hash (522c35e08b53f157ad3e51848caa861b258001e4), indicating a narrow scope tied to certain kernel builds used on Raspberry Pi hardware. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-22011 is primarily on systems deploying Raspberry Pi Compute Module 4 devices running affected Linux kernel versions, especially in embedded or IoT applications where power management and device reliability are critical. Potential impacts include system instability, unexpected crashes of the VPU firmware, and failure of USB 3.0 devices to resume after suspend, which could disrupt operations relying on these peripherals. This may affect industries such as manufacturing automation, digital signage, smart building controls, and other sectors using Raspberry Pi CM4 for edge computing or control systems. While the vulnerability does not directly lead to remote code execution or data breach, the resulting instability could cause denial of service or operational downtime. Since the issue is tied to power management during suspend/resume cycles, devices that frequently enter low-power states are more susceptible. The lack of known exploits reduces immediate risk, but organizations should consider the operational impact of hardware or firmware crashes in their environments.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Ensure that Linux kernel versions deployed on Raspberry Pi CM4 devices are updated to include the fix that avoids simultaneous use of raspberrypi-power and bcm2835-power drivers. This may require applying specific kernel patches or upgrading to a kernel version that incorporates the fix. 2) Review and test power management configurations on affected devices, particularly the suspend-to-idle (s2idle) settings, to confirm stable resume behavior. 3) Avoid custom kernel builds or configurations that enable conflicting power domain drivers simultaneously. 4) Monitor system logs for USB power errors or VPU firmware crashes as indicators of the issue. 5) For critical deployments, consider implementing watchdog mechanisms or redundancy to handle potential device crashes gracefully. 6) Engage with Linux kernel maintainers or Raspberry Pi support channels to stay informed about further updates or patches related to this vulnerability. These steps go beyond generic advice by focusing on kernel version control, driver configuration, and operational monitoring specific to the affected hardware and power management scenario.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-22011: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ARM: dts: bcm2711: Fix xHCI power-domain During s2idle tests on the Raspberry CM4 the VPU firmware always crashes on xHCI power-domain resume: root@raspberrypi:/sys/power# echo freeze > state [ 70.724347] xhci_suspend finished [ 70.727730] xhci_plat_suspend finished [ 70.755624] bcm2835-power bcm2835-power: Power grafx off [ 70.761127] USB: Set power to 0 [ 74.653040] USB: Failed to set power to 1 (-110) This seems to be caused because of the mixed usage of raspberrypi-power and bcm2835-power at the same time. So avoid the usage of the VPU firmware power-domain driver, which prevents the VPU crash.
AI-Powered Analysis
Technical Analysis
CVE-2025-22011 is a vulnerability identified in the Linux kernel specifically affecting the ARM architecture implementation on the Raspberry Pi Compute Module 4 (CM4). The issue arises from the improper handling of power domains related to the USB 3.0 xHCI controller and the Video Processing Unit (VPU) firmware during system suspend and resume cycles, particularly when using the s2idle (suspend-to-idle) power state. The root cause is the mixed usage of two power domain drivers: raspberrypi-power and bcm2835-power, which leads to conflicts in power management. During resume from s2idle, the VPU firmware crashes because the xHCI power domain is not correctly restored, as evidenced by kernel logs showing failure to set USB power back on (error -110). This improper power domain management can cause system instability or failure of USB devices to resume correctly after suspend. The vulnerability is addressed by avoiding the simultaneous use of these conflicting power domain drivers, effectively preventing the VPU crash. The affected Linux kernel versions are identified by a specific commit hash (522c35e08b53f157ad3e51848caa861b258001e4), indicating a narrow scope tied to certain kernel builds used on Raspberry Pi hardware. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-22011 is primarily on systems deploying Raspberry Pi Compute Module 4 devices running affected Linux kernel versions, especially in embedded or IoT applications where power management and device reliability are critical. Potential impacts include system instability, unexpected crashes of the VPU firmware, and failure of USB 3.0 devices to resume after suspend, which could disrupt operations relying on these peripherals. This may affect industries such as manufacturing automation, digital signage, smart building controls, and other sectors using Raspberry Pi CM4 for edge computing or control systems. While the vulnerability does not directly lead to remote code execution or data breach, the resulting instability could cause denial of service or operational downtime. Since the issue is tied to power management during suspend/resume cycles, devices that frequently enter low-power states are more susceptible. The lack of known exploits reduces immediate risk, but organizations should consider the operational impact of hardware or firmware crashes in their environments.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Ensure that Linux kernel versions deployed on Raspberry Pi CM4 devices are updated to include the fix that avoids simultaneous use of raspberrypi-power and bcm2835-power drivers. This may require applying specific kernel patches or upgrading to a kernel version that incorporates the fix. 2) Review and test power management configurations on affected devices, particularly the suspend-to-idle (s2idle) settings, to confirm stable resume behavior. 3) Avoid custom kernel builds or configurations that enable conflicting power domain drivers simultaneously. 4) Monitor system logs for USB power errors or VPU firmware crashes as indicators of the issue. 5) For critical deployments, consider implementing watchdog mechanisms or redundancy to handle potential device crashes gracefully. 6) Engage with Linux kernel maintainers or Raspberry Pi support channels to stay informed about further updates or patches related to this vulnerability. These steps go beyond generic advice by focusing on kernel version control, driver configuration, and operational monitoring specific to the affected hardware and power management scenario.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.804Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8f02
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 11:55:55 AM
Last updated: 8/9/2025, 3:15:28 AM
Views: 12
Related Threats
CVE-2025-55195: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in denoland std
HighCVE-2025-55192: CWE-94: Improper Control of Generation of Code ('Code Injection') in JurajNyiri HomeAssistant-Tapo-Control
HighCVE-2025-20220: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Cisco Cisco Firepower Management Center
MediumCVE-2025-9043: CWE-428 Unquoted Search Path or Element in Seagate Toolkit
MediumCVE-2025-8969: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.