GHSA-WVMF-V9M3-RVRR
Vulnerability from github – Published: 2026-04-27 18:32 – Updated: 2026-05-06 21:31In the Linux kernel, the following vulnerability has been resolved:
gpio: omap: do not register driver in probe()
Commit 11a78b794496 ("ARM: OMAP: MPUIO wake updates") registers the omap_mpuio_driver from omap_mpuio_init(), which is called from omap_gpio_probe().
However, it neither makes sense to register drivers from probe() callbacks of other drivers, nor does the driver core allow registering drivers with a device lock already being held.
The latter was revealed by commit dc23806a7c47 ("driver core: enforce device_lock for driver_match_device()") leading to a potential deadlock condition described in [1].
Additionally, the omap_mpuio_driver is never unregistered from the driver core, even if the module is unloaded.
Hence, register the omap_mpuio_driver from the module initcall and unregister it in module_exit().
{
"affected": [],
"aliases": [
"CVE-2026-31687"
],
"database_specific": {
"cwe_ids": [
"CWE-667"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-27T18:16:54Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: omap: do not register driver in probe()\n\nCommit 11a78b794496 (\"ARM: OMAP: MPUIO wake updates\") registers the\nomap_mpuio_driver from omap_mpuio_init(), which is called from\nomap_gpio_probe().\n\nHowever, it neither makes sense to register drivers from probe()\ncallbacks of other drivers, nor does the driver core allow registering\ndrivers with a device lock already being held.\n\nThe latter was revealed by commit dc23806a7c47 (\"driver core: enforce\ndevice_lock for driver_match_device()\") leading to a potential deadlock\ncondition described in [1].\n\nAdditionally, the omap_mpuio_driver is never unregistered from the\ndriver core, even if the module is unloaded.\n\nHence, register the omap_mpuio_driver from the module initcall and\nunregister it in module_exit().",
"id": "GHSA-wvmf-v9m3-rvrr",
"modified": "2026-05-06T21:31:30Z",
"published": "2026-04-27T18:32:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31687"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/03db4dc9ad6eb91e640b517e00373ce877682854"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/1c04c3a4de8d4bcb9202f94c44f26c57c2572308"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/2211d77892913804d16c28c7415b82804ab1e54c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/32f08c3ddd6dda6cbb6c9d715de10f21dccde50f"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/53a76425e0764421ba93bb9045d2e454667d5687"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/57bcd3feffa79544c73a1a1872472389a391cc79"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/673dafb9a86349a12a93151fd467625614dc7e12"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/730e5ebff40c852e3ea57b71bf02a4b89c69435f"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/86588916e1887a5edb8a9161cd7ae81e47a7ed25"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a29215961d833f4de33a09c3964d31ebc6083033"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a7fa9460b86f810913b6779461d0448e7c11214c"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.