Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-22022
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-16 Apr, 2025 | 10:23
Updated At-19 Jan, 2026 | 12:17
Rejected At-
▼CVE Numbering Authority (CNA)
usb: xhci: Apply the link chain quirk on NEC isoc endpoints

In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Apply the link chain quirk on NEC isoc endpoints Two clearly different specimens of NEC uPD720200 (one with start/stop bug, one without) were seen to cause IOMMU faults after some Missed Service Errors. Faulting address is immediately after a transfer ring segment and patched dynamic debug messages revealed that the MSE was received when waiting for a TD near the end of that segment: [ 1.041954] xhci_hcd: Miss service interval error for slot 1 ep 2 expected TD DMA ffa08fe0 [ 1.042120] xhci_hcd: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x0005 address=0xffa09000 flags=0x0000] [ 1.042146] xhci_hcd: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x0005 address=0xffa09040 flags=0x0000] It gets even funnier if the next page is a ring segment accessible to the HC. Below, it reports MSE in segment at ff1e8000, plows through a zero-filled page at ff1e9000 and starts reporting events for TRBs in page at ff1ea000 every microframe, instead of jumping to seg ff1e6000. [ 7.041671] xhci_hcd: Miss service interval error for slot 1 ep 2 expected TD DMA ff1e8fe0 [ 7.041999] xhci_hcd: Miss service interval error for slot 1 ep 2 expected TD DMA ff1e8fe0 [ 7.042011] xhci_hcd: WARN: buffer overrun event for slot 1 ep 2 on endpoint [ 7.042028] xhci_hcd: All TDs skipped for slot 1 ep 2. Clear skip flag. [ 7.042134] xhci_hcd: WARN: buffer overrun event for slot 1 ep 2 on endpoint [ 7.042138] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 31 [ 7.042144] xhci_hcd: Looking for event-dma 00000000ff1ea040 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820 [ 7.042259] xhci_hcd: WARN: buffer overrun event for slot 1 ep 2 on endpoint [ 7.042262] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 31 [ 7.042266] xhci_hcd: Looking for event-dma 00000000ff1ea050 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820 At some point completion events change from Isoch Buffer Overrun to Short Packet and the HC finally finds cycle bit mismatch in ff1ec000. [ 7.098130] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13 [ 7.098132] xhci_hcd: Looking for event-dma 00000000ff1ecc50 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820 [ 7.098254] xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13 [ 7.098256] xhci_hcd: Looking for event-dma 00000000ff1ecc60 trb-start 00000000ff1e6820 trb-end 00000000ff1e6820 [ 7.098379] xhci_hcd: Overrun event on slot 1 ep 2 It's possible that data from the isochronous device were written to random buffers of pending TDs on other endpoints (either IN or OUT), other devices or even other HCs in the same IOMMU domain. Lastly, an error from a different USB device on another HC. Was it caused by the above? I don't know, but it may have been. The disk was working without any other issues and generated PCIe traffic to starve the NEC of upstream BW and trigger those MSEs. The two HCs shared one x1 slot by means of a commercial "PCIe splitter" board. [ 7.162604] usb 10-2: reset SuperSpeed USB device number 3 using xhci_hcd [ 7.178990] sd 9:0:0:0: [sdb] tag#0 UNKNOWN(0x2003) Result: hostbyte=0x07 driverbyte=DRIVER_OK cmd_age=0s [ 7.179001] sd 9:0:0:0: [sdb] tag#0 CDB: opcode=0x28 28 00 04 02 ae 00 00 02 00 00 [ 7.179004] I/O error, dev sdb, sector 67284480 op 0x0:(READ) flags 0x80700 phys_seg 5 prio class 0 Fortunately, it appears that this ridiculous bug is avoided by setting the chain bit of Link TRBs on isochronous rings. Other ancient HCs are known which also expect the bit to be set and they ignore Link TRBs if it's not. Reportedly, 0.95 spec guaranteed that the bit is set. The bandwidth-starved NEC HC running a 32KB/uframe UVC endpoint reports tens of MSEs per second and runs into the bug within seconds. Chaining Link TRBs allows the same workload to run for many minutes, many times. No ne ---truncated---

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/usb/host/xhci.h
Default Status
unaffected
Versions
Affected
  • From 7e393a834b41001174a8fb3ae3bc23a749467760 before abf2df229b6a9172cc1827749c1a446d28e00a2e (git)
  • From 7e393a834b41001174a8fb3ae3bc23a749467760 before 8b586de6f03c850ff48d42e539b4708d1f3f8f1a (git)
  • From 7e393a834b41001174a8fb3ae3bc23a749467760 before 1143f790a6316201dc8f067eba4c94ea97ecb6ca (git)
  • From 7e393a834b41001174a8fb3ae3bc23a749467760 before dbf427663ce272070d3004b5fca63a4a537d781c (git)
  • From 7e393a834b41001174a8fb3ae3bc23a749467760 before a4931d9fb99eb5462f3eaa231999d279c40afb21 (git)
  • From 7e393a834b41001174a8fb3ae3bc23a749467760 before 43a18225150ce874d23b37761c302a5dffee1595 (git)
  • From 7e393a834b41001174a8fb3ae3bc23a749467760 before 061a1683bae6ef56ab8fa392725ba7495515cd1d (git)
  • From 7e393a834b41001174a8fb3ae3bc23a749467760 before bb0ba4cb1065e87f9cc75db1fa454e56d0894d01 (git)
  • 5c7a6982e976b381595c9d4ee8e8c94564a40aec (git)
  • f12ea4a8ca7009fa2d54794c3fcb8e638453bcff (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/usb/host/xhci.h
Default Status
affected
Versions
Affected
  • 3.2
Unaffected
  • From 0 before 3.2 (semver)
  • From 5.10.248 through 5.10.* (semver)
  • From 5.15.198 through 5.15.* (semver)
  • From 6.1.160 through 6.1.* (semver)
  • From 6.6.120 through 6.6.* (semver)
  • From 6.12.22 through 6.12.* (semver)
  • From 6.13.10 through 6.13.* (semver)
  • From 6.14.1 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/abf2df229b6a9172cc1827749c1a446d28e00a2e
N/A
https://git.kernel.org/stable/c/8b586de6f03c850ff48d42e539b4708d1f3f8f1a
N/A
https://git.kernel.org/stable/c/1143f790a6316201dc8f067eba4c94ea97ecb6ca
N/A
https://git.kernel.org/stable/c/dbf427663ce272070d3004b5fca63a4a537d781c
N/A
https://git.kernel.org/stable/c/a4931d9fb99eb5462f3eaa231999d279c40afb21
N/A
https://git.kernel.org/stable/c/43a18225150ce874d23b37761c302a5dffee1595
N/A
https://git.kernel.org/stable/c/061a1683bae6ef56ab8fa392725ba7495515cd1d
N/A
https://git.kernel.org/stable/c/bb0ba4cb1065e87f9cc75db1fa454e56d0894d01
N/A
Hyperlink: https://git.kernel.org/stable/c/abf2df229b6a9172cc1827749c1a446d28e00a2e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8b586de6f03c850ff48d42e539b4708d1f3f8f1a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1143f790a6316201dc8f067eba4c94ea97ecb6ca
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/dbf427663ce272070d3004b5fca63a4a537d781c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a4931d9fb99eb5462f3eaa231999d279c40afb21
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/43a18225150ce874d23b37761c302a5dffee1595
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/061a1683bae6ef56ab8fa392725ba7495515cd1d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bb0ba4cb1065e87f9cc75db1fa454e56d0894d01
Resource: N/A
Details not found