gpio: omap: do not register driver in probe()
Summary
| CVE | CVE-2026-31687 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-27 18:16:54 UTC |
| Updated | 2026-05-06 19:05:57 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: gpio: omap: do not register driver in probe() Commit 11a78b794496 ("ARM: OMAP: MPUIO wake updates") registers the omap_mpuio_driver from omap_mpuio_init(), which is called from omap_gpio_probe(). However, it neither makes sense to register drivers from probe() callbacks of other drivers, nor does the driver core allow registering drivers with a device lock already being held. The latter was revealed by commit dc23806a7c47 ("driver core: enforce device_lock for driver_match_device()") leading to a potential deadlock condition described in [1]. Additionally, the omap_mpuio_driver is never unregistered from the driver core, even if the module is unloaded. Hence, register the omap_mpuio_driver from the module initcall and unregister it in module_exit(). |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Problem Types: CWE-667
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 11a78b7944963a8b052be46108d07a3ced9e2762 57bcd3feffa79544c73a1a1872472389a391cc79 git | Not specified |
| CNA | Linux | Linux | affected 11a78b7944963a8b052be46108d07a3ced9e2762 86588916e1887a5edb8a9161cd7ae81e47a7ed25 git | Not specified |
| CNA | Linux | Linux | affected 11a78b7944963a8b052be46108d07a3ced9e2762 a29215961d833f4de33a09c3964d31ebc6083033 git | Not specified |
| CNA | Linux | Linux | affected 11a78b7944963a8b052be46108d07a3ced9e2762 1c04c3a4de8d4bcb9202f94c44f26c57c2572308 git | Not specified |
| CNA | Linux | Linux | affected adc1796eced46b48e23ec200a219d635f33a38ee 673dafb9a86349a12a93151fd467625614dc7e12 git | Not specified |
| CNA | Linux | Linux | affected 11a78b7944963a8b052be46108d07a3ced9e2762 2211d77892913804d16c28c7415b82804ab1e54c git | Not specified |
| CNA | Linux | Linux | affected cd0e0a76e40c2e77bcfc88291d00dca22b00158e a7fa9460b86f810913b6779461d0448e7c11214c git | Not specified |
| CNA | Linux | Linux | affected 11a78b7944963a8b052be46108d07a3ced9e2762 32f08c3ddd6dda6cbb6c9d715de10f21dccde50f git | Not specified |
| CNA | Linux | Linux | affected 8d76b2488eb3cc0717ab81b60622cff4a5f90f79 53a76425e0764421ba93bb9045d2e454667d5687 git | Not specified |
| CNA | Linux | Linux | affected 11a78b7944963a8b052be46108d07a3ced9e2762 730e5ebff40c852e3ea57b71bf02a4b89c69435f git | Not specified |
| CNA | Linux | Linux | affected bc82e5f4d7dc8237ae8cabc73aa46fc93c85d98c 03db4dc9ad6eb91e640b517e00373ce877682854 git | Not specified |
| CNA | Linux | Linux | affected 2.6.22 | Not specified |
| CNA | Linux | Linux | unaffected 2.6.22 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.251 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.201 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.164 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.125 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.126 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.72 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.73 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.11 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.12 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.2 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/32f08c3ddd6dda6cbb6c9d715de10f21dccde50f | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/57bcd3feffa79544c73a1a1872472389a391cc79 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/86588916e1887a5edb8a9161cd7ae81e47a7ed25 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/673dafb9a86349a12a93151fd467625614dc7e12 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/53a76425e0764421ba93bb9045d2e454667d5687 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/2211d77892913804d16c28c7415b82804ab1e54c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/1c04c3a4de8d4bcb9202f94c44f26c57c2572308 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/730e5ebff40c852e3ea57b71bf02a4b89c69435f | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/a7fa9460b86f810913b6779461d0448e7c11214c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/03db4dc9ad6eb91e640b517e00373ce877682854 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/a29215961d833f4de33a09c3964d31ebc6083033 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.