CVE-2026-31550
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2026
Last modified:
27/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
pmdomain: bcm: bcm2835-power: Increase ASB control timeout<br />
<br />
The bcm2835_asb_control() function uses a tight polling loop to wait<br />
for the ASB bridge to acknowledge a request. During intensive workloads,<br />
this handshake intermittently fails for V3D&#39;s master ASB on BCM2711,<br />
resulting in "Failed to disable ASB master for v3d" errors during<br />
runtime PM suspend. As a consequence, the failed power-off leaves V3D in<br />
a broken state, leading to bus faults or system hangs on later accesses.<br />
<br />
As the timeout is insufficient in some scenarios, increase the polling<br />
timeout from 1us to 5us, which is still negligible in the context of a<br />
power domain transition. Also, replace the open-coded ktime_get_ns()/<br />
cpu_relax() polling loop with readl_poll_timeout_atomic().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.1.1 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.167 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.78 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.1:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0e84e74849d2d7e9b23a09c2d5e0d9357db1ca59
- https://git.kernel.org/stable/c/18605b1b936b66b1f34dcf8e9ad4f1fbcf7a7c13
- https://git.kernel.org/stable/c/572f17180f26619809b8e0593d926762aa8660ff
- https://git.kernel.org/stable/c/622ab02e955c35c125ff2b65d8327b2c52db8758
- https://git.kernel.org/stable/c/9443202d91388026dbf7312972a74fbfd27ee82f
- https://git.kernel.org/stable/c/b826d2c0b0ecb844c84431ba6b502e744f5d919a
- https://git.kernel.org/stable/c/c5e734f6a0740dce92e7c919e632cb43fa5d4e53
- https://git.kernel.org/stable/c/ea4fa54b83bb2e4a21e9026824bfe271b1a6ee1e



