CVE-2026-31655
Description
In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled
Keep the NOC_HDCP clock always enabled to fix the potential hang caused by the NoC ADB400 port power down handshake.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A potential hang during the NoC ADB400 port power-down handshake in the imx8mp-blk-ctrl PM domain driver is prevented by keeping the NOC_HDCP clock always enabled.
Vulnerability
Overview
A fix has been applied to the Linux kernel's pmdomain: imx8mp-blk-ctrl module. The root cause is that the NoC ADB400 port power-down handshake could cause a system hang. To prevent this, the NOC_HDCP (NOC_HDCP) clock must remain enabled at all times during the handshake process. [1]
Attack
Vector and Exploitation
This vulnerability is triggered during the power-down sequence of certain SoC blocks controlled by the i.MX8MP's block control. An attacker with the ability to manipulate power management states—potentially through a user-space interface or kernel driver interaction—could induce the hang. No authentication is explicitly required beyond local access to the system, as the hang can be triggered by normal power management operations. [2]
Impact
A successful exploitation leads to a denial of service (DoS) condition where the system becomes unresponsive (hang). Since the hangThis can be used to disrupt services or prevent the system from booting properly. The CVSS v3 base score of 5.5 (Medium) reflects moderate impact, typically requiring local access and resulting in temporary unavailability. [3]
Mitigation
The fix has been applied in the Linux kernel stable branches. Users and vendors should apply the relevant kernel patches as provided in the references to address this issue on affected i.MX8MP platforms. [4]
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.1.1,<6.6.135
- cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/3086374e8bc7fd65f2cc62ef52351c6d662f1543nvdPatch
- git.kernel.org/stable/c/80fd0de89805a3f92dc320f5ab5a18007c260374nvdPatch
- git.kernel.org/stable/c/d1ef779d02b5df4e8bff4083b20bfea587b43c4bnvdPatch
- git.kernel.org/stable/c/e44919669f07b8f113ad49a248b44ca4f119bc94nvdPatch
- git.kernel.org/stable/c/e91d5f94acf68618ea3ad9c92ac28614e791ae7dnvdPatch
News mentions
0No linked articles in our index yet.