Skip to main content

CVE-2025-22011: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-22011cvecve-2025-22011
Published: Tue Apr 08 2025 (04/08/2025, 08:18:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ARM: dts: bcm2711: Fix xHCI power-domain During s2idle tests on the Raspberry CM4 the VPU firmware always crashes on xHCI power-domain resume: root@raspberrypi:/sys/power# echo freeze > state [ 70.724347] xhci_suspend finished [ 70.727730] xhci_plat_suspend finished [ 70.755624] bcm2835-power bcm2835-power: Power grafx off [ 70.761127] USB: Set power to 0 [ 74.653040] USB: Failed to set power to 1 (-110) This seems to be caused because of the mixed usage of raspberrypi-power and bcm2835-power at the same time. So avoid the usage of the VPU firmware power-domain driver, which prevents the VPU crash.

AI-Powered Analysis

AILast updated: 06/30/2025, 11:55:55 UTC

Technical Analysis

CVE-2025-22011 is a vulnerability identified in the Linux kernel specifically affecting the ARM architecture implementation on the Raspberry Pi Compute Module 4 (CM4). The issue arises from the improper handling of power domains related to the USB 3.0 xHCI controller and the Video Processing Unit (VPU) firmware during system suspend and resume cycles, particularly when using the s2idle (suspend-to-idle) power state. The root cause is the mixed usage of two power domain drivers: raspberrypi-power and bcm2835-power, which leads to conflicts in power management. During resume from s2idle, the VPU firmware crashes because the xHCI power domain is not correctly restored, as evidenced by kernel logs showing failure to set USB power back on (error -110). This improper power domain management can cause system instability or failure of USB devices to resume correctly after suspend. The vulnerability is addressed by avoiding the simultaneous use of these conflicting power domain drivers, effectively preventing the VPU crash. The affected Linux kernel versions are identified by a specific commit hash (522c35e08b53f157ad3e51848caa861b258001e4), indicating a narrow scope tied to certain kernel builds used on Raspberry Pi hardware. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2025-22011 is primarily on systems deploying Raspberry Pi Compute Module 4 devices running affected Linux kernel versions, especially in embedded or IoT applications where power management and device reliability are critical. Potential impacts include system instability, unexpected crashes of the VPU firmware, and failure of USB 3.0 devices to resume after suspend, which could disrupt operations relying on these peripherals. This may affect industries such as manufacturing automation, digital signage, smart building controls, and other sectors using Raspberry Pi CM4 for edge computing or control systems. While the vulnerability does not directly lead to remote code execution or data breach, the resulting instability could cause denial of service or operational downtime. Since the issue is tied to power management during suspend/resume cycles, devices that frequently enter low-power states are more susceptible. The lack of known exploits reduces immediate risk, but organizations should consider the operational impact of hardware or firmware crashes in their environments.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Ensure that Linux kernel versions deployed on Raspberry Pi CM4 devices are updated to include the fix that avoids simultaneous use of raspberrypi-power and bcm2835-power drivers. This may require applying specific kernel patches or upgrading to a kernel version that incorporates the fix. 2) Review and test power management configurations on affected devices, particularly the suspend-to-idle (s2idle) settings, to confirm stable resume behavior. 3) Avoid custom kernel builds or configurations that enable conflicting power domain drivers simultaneously. 4) Monitor system logs for USB power errors or VPU firmware crashes as indicators of the issue. 5) For critical deployments, consider implementing watchdog mechanisms or redundancy to handle potential device crashes gracefully. 6) Engage with Linux kernel maintainers or Raspberry Pi support channels to stay informed about further updates or patches related to this vulnerability. These steps go beyond generic advice by focusing on kernel version control, driver configuration, and operational monitoring specific to the affected hardware and power management scenario.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.804Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe8f02

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 11:55:55 AM

Last updated: 8/9/2025, 3:15:28 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats