VYPR
Medium severity5.5NVD Advisory· Published Apr 24, 2026· Updated Apr 27, 2026

CVE-2026-31655

CVE-2026-31655

Description

In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled

Keep the NOC_HDCP clock always enabled to fix the potential hang caused by the NoC ADB400 port power down handshake.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A potential hang during the NoC ADB400 port power-down handshake in the imx8mp-blk-ctrl PM domain driver is prevented by keeping the NOC_HDCP clock always enabled.

Vulnerability

Overview

A fix has been applied to the Linux kernel's pmdomain: imx8mp-blk-ctrl module. The root cause is that the NoC ADB400 port power-down handshake could cause a system hang. To prevent this, the NOC_HDCP (NOC_HDCP) clock must remain enabled at all times during the handshake process. [1]

Attack

Vector and Exploitation

This vulnerability is triggered during the power-down sequence of certain SoC blocks controlled by the i.MX8MP's block control. An attacker with the ability to manipulate power management states—potentially through a user-space interface or kernel driver interaction—could induce the hang. No authentication is explicitly required beyond local access to the system, as the hang can be triggered by normal power management operations. [2]

Impact

A successful exploitation leads to a denial of service (DoS) condition where the system becomes unresponsive (hang). Since the hangThis can be used to disrupt services or prevent the system from booting properly. The CVSS v3 base score of 5.5 (Medium) reflects moderate impact, typically requiring local access and resulting in temporary unavailability. [3]

Mitigation

The fix has been applied in the Linux kernel stable branches. Users and vendors should apply the relevant kernel patches as provided in the references to address this issue on affected i.MX8MP platforms. [4]

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

9
  • Linux/Kernel9 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.1.1,<6.6.135
    • cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.