pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled
Summary
| CVE | CVE-2026-31655 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-24 15:16:44 UTC |
| Updated | 2026-04-24 17:51:40 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled
Keep the NOC_HDCP clock always enabled to fix the potential hang
caused by the NoC ADB400 port power down handshake. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 77b0ddb42add47748c661f714e6f4b116a6e8759 80fd0de89805a3f92dc320f5ab5a18007c260374 git |
Not specified |
| CNA |
Linux |
Linux |
affected 77b0ddb42add47748c661f714e6f4b116a6e8759 3086374e8bc7fd65f2cc62ef52351c6d662f1543 git |
Not specified |
| CNA |
Linux |
Linux |
affected 77b0ddb42add47748c661f714e6f4b116a6e8759 e44919669f07b8f113ad49a248b44ca4f119bc94 git |
Not specified |
| CNA |
Linux |
Linux |
affected 77b0ddb42add47748c661f714e6f4b116a6e8759 d1ef779d02b5df4e8bff4083b20bfea587b43c4b git |
Not specified |
| CNA |
Linux |
Linux |
affected 77b0ddb42add47748c661f714e6f4b116a6e8759 e91d5f94acf68618ea3ad9c92ac28614e791ae7d git |
Not specified |
| CNA |
Linux |
Linux |
affected 6.1 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.135 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.82 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.23 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.13 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/e44919669f07b8f113ad49a248b44ca4f119bc94 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/d1ef779d02b5df4e8bff4083b20bfea587b43c4b |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/e91d5f94acf68618ea3ad9c92ac28614e791ae7d |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/80fd0de89805a3f92dc320f5ab5a18007c260374 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/3086374e8bc7fd65f2cc62ef52351c6d662f1543 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.