gpio: omap: do not register driver in probe()

Summary

CVECVE-2026-31687
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-04-27 18:16:54 UTC
Updated2026-05-06 19:05:57 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: gpio: omap: do not register driver in probe() Commit 11a78b794496 ("ARM: OMAP: MPUIO wake updates") registers the omap_mpuio_driver from omap_mpuio_init(), which is called from omap_gpio_probe(). However, it neither makes sense to register drivers from probe() callbacks of other drivers, nor does the driver core allow registering drivers with a device lock already being held. The latter was revealed by commit dc23806a7c47 ("driver core: enforce device_lock for driver_match_device()") leading to a potential deadlock condition described in [1]. Additionally, the omap_mpuio_driver is never unregistered from the driver core, even if the module is unloaded. Hence, register the omap_mpuio_driver from the module initcall and unregister it in module_exit().

Risk And Classification

Primary CVSS: v3.1 5.5 MEDIUM from [email protected]

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem Types: CWE-667

CVSS v3.1 Breakdown

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Linux Linux Kernel All All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 11a78b7944963a8b052be46108d07a3ced9e2762 57bcd3feffa79544c73a1a1872472389a391cc79 git Not specified
CNA Linux Linux affected 11a78b7944963a8b052be46108d07a3ced9e2762 86588916e1887a5edb8a9161cd7ae81e47a7ed25 git Not specified
CNA Linux Linux affected 11a78b7944963a8b052be46108d07a3ced9e2762 a29215961d833f4de33a09c3964d31ebc6083033 git Not specified
CNA Linux Linux affected 11a78b7944963a8b052be46108d07a3ced9e2762 1c04c3a4de8d4bcb9202f94c44f26c57c2572308 git Not specified
CNA Linux Linux affected adc1796eced46b48e23ec200a219d635f33a38ee 673dafb9a86349a12a93151fd467625614dc7e12 git Not specified
CNA Linux Linux affected 11a78b7944963a8b052be46108d07a3ced9e2762 2211d77892913804d16c28c7415b82804ab1e54c git Not specified
CNA Linux Linux affected cd0e0a76e40c2e77bcfc88291d00dca22b00158e a7fa9460b86f810913b6779461d0448e7c11214c git Not specified
CNA Linux Linux affected 11a78b7944963a8b052be46108d07a3ced9e2762 32f08c3ddd6dda6cbb6c9d715de10f21dccde50f git Not specified
CNA Linux Linux affected 8d76b2488eb3cc0717ab81b60622cff4a5f90f79 53a76425e0764421ba93bb9045d2e454667d5687 git Not specified
CNA Linux Linux affected 11a78b7944963a8b052be46108d07a3ced9e2762 730e5ebff40c852e3ea57b71bf02a4b89c69435f git Not specified
CNA Linux Linux affected bc82e5f4d7dc8237ae8cabc73aa46fc93c85d98c 03db4dc9ad6eb91e640b517e00373ce877682854 git Not specified
CNA Linux Linux affected 2.6.22 Not specified
CNA Linux Linux unaffected 2.6.22 semver Not specified
CNA Linux Linux unaffected 5.10.251 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.201 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.164 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.125 6.6.* semver Not specified
CNA Linux Linux unaffected 6.6.126 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.72 6.12.* semver Not specified
CNA Linux Linux unaffected 6.12.73 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.11 6.18.* semver Not specified
CNA Linux Linux unaffected 6.18.12 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.2 6.19.* semver Not specified
CNA Linux Linux unaffected 6.19 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/32f08c3ddd6dda6cbb6c9d715de10f21dccde50f 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/57bcd3feffa79544c73a1a1872472389a391cc79 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/86588916e1887a5edb8a9161cd7ae81e47a7ed25 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/673dafb9a86349a12a93151fd467625614dc7e12 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/53a76425e0764421ba93bb9045d2e454667d5687 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/2211d77892913804d16c28c7415b82804ab1e54c 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/1c04c3a4de8d4bcb9202f94c44f26c57c2572308 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/730e5ebff40c852e3ea57b71bf02a4b89c69435f 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/a7fa9460b86f810913b6779461d0448e7c11214c 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/03db4dc9ad6eb91e640b517e00373ce877682854 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/a29215961d833f4de33a09c3964d31ebc6083033 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report