VYPR
Medium severity5.5NVD Advisory· Published Apr 24, 2026· Updated Apr 28, 2026

CVE-2026-31545

CVE-2026-31545

Description

In the Linux kernel, the following vulnerability has been resolved:

NFC: nxp-nci: allow GPIOs to sleep

Allow the firmware and enable GPIOs to sleep.

This fixes a `WARN_ON' and allows the driver to operate GPIOs which are connected to I2C GPIO expanders.

-- >8 -- kernel: WARNING: CPU: 3 PID: 2636 at drivers/gpio/gpiolib.c:3880 gpiod_set_value+0x88/0x98 -- >8 --

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's NXP-NCI NFC driver, a bug causes a kernel WARN_ON when GPIOs are accessed in atomic context; the fix allows GPIOs to sleep.

Root

Cause

The vulnerability in the Linux kernel's NXP-NCI NFC driver occurs because the driver uses gpiod_set_value() without allowing the GPIO to sleep, triggering a kernel WARN_ON when the GPIO is connected to an I2C GPIO expander that requires sleeping [1]. Since GPIO operations can be called from atomic contexts, the driver must use the gpiod_set_value_cansleep() variant to avoid the warning.

Exploitation

An attacker with local access or the ability to trigger NFC operations (e.g., through the NFC subsystem) can cause the kernel to emit the warning, potentially leading to a denial-of-service condition if repeated. No special privileges are required beyond the ability to interact with the NFC driver.

Impact

While the warning itself does not directly corrupt data, it indicates a kernel bug that could lead to system instability if the GPIO operation fails. The CVSS score of 5.5 (medium) reflects the potential for local denial of service.

Mitigation

The fix has been applied to the Linux kernel stable branches [1]. Users should update to a kernel version that includes the commit c24dcac1a9d1b4fd164898df0c2f5b0adbf81a78 or later.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

5
  • Linux/Kernel5 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=5.4,<5.10.253
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.