๐Ÿ” CVE Alert

CVE-2026-31687

UNKNOWN 0.0

gpio: omap: do not register driver in probe()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: gpio: omap: do not register driver in probe() Commit 11a78b794496 ("ARM: OMAP: MPUIO wake updates") registers the omap_mpuio_driver from omap_mpuio_init(), which is called from omap_gpio_probe(). However, it neither makes sense to register drivers from probe() callbacks of other drivers, nor does the driver core allow registering drivers with a device lock already being held. The latter was revealed by commit dc23806a7c47 ("driver core: enforce device_lock for driver_match_device()") leading to a potential deadlock condition described in [1]. Additionally, the omap_mpuio_driver is never unregistered from the driver core, even if the module is unloaded. Hence, register the omap_mpuio_driver from the module initcall and unregister it in module_exit().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 27, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
11a78b7944963a8b052be46108d07a3ced9e2762 < 57bcd3feffa79544c73a1a1872472389a391cc79 11a78b7944963a8b052be46108d07a3ced9e2762 < 86588916e1887a5edb8a9161cd7ae81e47a7ed25 11a78b7944963a8b052be46108d07a3ced9e2762 < a29215961d833f4de33a09c3964d31ebc6083033 11a78b7944963a8b052be46108d07a3ced9e2762 < 1c04c3a4de8d4bcb9202f94c44f26c57c2572308 adc1796eced46b48e23ec200a219d635f33a38ee < 673dafb9a86349a12a93151fd467625614dc7e12 11a78b7944963a8b052be46108d07a3ced9e2762 < 2211d77892913804d16c28c7415b82804ab1e54c cd0e0a76e40c2e77bcfc88291d00dca22b00158e < a7fa9460b86f810913b6779461d0448e7c11214c 11a78b7944963a8b052be46108d07a3ced9e2762 < 32f08c3ddd6dda6cbb6c9d715de10f21dccde50f 8d76b2488eb3cc0717ab81b60622cff4a5f90f79 < 53a76425e0764421ba93bb9045d2e454667d5687 11a78b7944963a8b052be46108d07a3ced9e2762 < 730e5ebff40c852e3ea57b71bf02a4b89c69435f bc82e5f4d7dc8237ae8cabc73aa46fc93c85d98c < 03db4dc9ad6eb91e640b517e00373ce877682854
Linux / Linux
2.6.22

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/57bcd3feffa79544c73a1a1872472389a391cc79 git.kernel.org: https://git.kernel.org/stable/c/86588916e1887a5edb8a9161cd7ae81e47a7ed25 git.kernel.org: https://git.kernel.org/stable/c/a29215961d833f4de33a09c3964d31ebc6083033 git.kernel.org: https://git.kernel.org/stable/c/1c04c3a4de8d4bcb9202f94c44f26c57c2572308 git.kernel.org: https://git.kernel.org/stable/c/673dafb9a86349a12a93151fd467625614dc7e12 git.kernel.org: https://git.kernel.org/stable/c/2211d77892913804d16c28c7415b82804ab1e54c git.kernel.org: https://git.kernel.org/stable/c/a7fa9460b86f810913b6779461d0448e7c11214c git.kernel.org: https://git.kernel.org/stable/c/32f08c3ddd6dda6cbb6c9d715de10f21dccde50f git.kernel.org: https://git.kernel.org/stable/c/53a76425e0764421ba93bb9045d2e454667d5687 git.kernel.org: https://git.kernel.org/stable/c/730e5ebff40c852e3ea57b71bf02a4b89c69435f git.kernel.org: https://git.kernel.org/stable/c/03db4dc9ad6eb91e640b517e00373ce877682854