Description
In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled

Keep the NOC_HDCP clock always enabled to fix the potential hang
caused by the NoC ADB400 port power down handshake.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service through kernel hang
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from an incorrect handling of the NOC_HDCP clock during a NoC ADB400 port power‑down handshake, a weakness classified as CWE‑413: Incorrect Interface Usage. The driver may disable the clock, causing the handshake to stall and potentially leading to a kernel hang. A patch that forces the clock to remain enabled fixes the problem and prevents the denial of service.

Affected Systems

The vulnerability is present by default in Linux kernel 6.1 and all 7.0 release‑candidate builds (rc1 through rc7). It affects systems that load the imx8mp‑blk‑ctrl driver before the patch that keeps the NOC_HDCP clock enabled.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity. The EPSS score of less than 1% shows a very low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Exploitation would require an attacker able to trigger the NoC ADB400 power‑down sequence, which is unlikely without privileged or kernel access or a component failure. Overall, the risk is low to moderate, but the potential impact on availability warrants timely remediation.

Generated by OpenCVE AI on April 28, 2026 at 23:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a release that includes the fix for the NOC_HDCP clock retention, such as the latest 6.1.x or a 7.0 release candidate with the relevant commit.
  • Until the kernel is updated, avoid performing NoC ADB400 port power‑down sequences during critical operations, or disable related power state changes to prevent the handshake from stalling.
  • Monitor system logs for signs of NoC ADB400 port power‑down stalls and be prepared to reboot or recover if a kernel hang occurs.

Generated by OpenCVE AI on April 28, 2026 at 23:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Mon, 27 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-413
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled Keep the NOC_HDCP clock always enabled to fix the potential hang caused by the NoC ADB400 port power down handshake.
Title pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:13:00.925Z

Reserved: 2026-03-09T15:48:24.129Z

Link: CVE-2026-31655

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:44.993

Modified: 2026-04-27T20:16:32.123

Link: CVE-2026-31655

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31655 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T23:45:16Z

Weaknesses