U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-31687 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: gpio: omap: do not register driver in probe() Commit 11a78b794496 ("ARM: OMAP: MPUIO wake updates") registers the omap_mpuio_driver from omap_mpuio_init(), which is called from omap_gpio_probe(). However, it neither makes sense to register drivers from probe() callbacks of other drivers, nor does the driver core allow registering drivers with a device lock already being held. The latter was revealed by commit dc23806a7c47 ("driver core: enforce device_lock for driver_match_device()") leading to a potential deadlock condition described in [1]. Additionally, the omap_mpuio_driver is never unregistered from the driver core, even if the module is unloaded. Hence, register the omap_mpuio_driver from the module initcall and unregister it in module_exit().


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/03db4dc9ad6eb91e640b517e00373ce877682854 kernel.org
https://git.kernel.org/stable/c/1c04c3a4de8d4bcb9202f94c44f26c57c2572308 kernel.org
https://git.kernel.org/stable/c/2211d77892913804d16c28c7415b82804ab1e54c kernel.org
https://git.kernel.org/stable/c/32f08c3ddd6dda6cbb6c9d715de10f21dccde50f kernel.org
https://git.kernel.org/stable/c/53a76425e0764421ba93bb9045d2e454667d5687 kernel.org
https://git.kernel.org/stable/c/57bcd3feffa79544c73a1a1872472389a391cc79 kernel.org
https://git.kernel.org/stable/c/673dafb9a86349a12a93151fd467625614dc7e12 kernel.org
https://git.kernel.org/stable/c/730e5ebff40c852e3ea57b71bf02a4b89c69435f kernel.org
https://git.kernel.org/stable/c/86588916e1887a5edb8a9161cd7ae81e47a7ed25 kernel.org
https://git.kernel.org/stable/c/a29215961d833f4de33a09c3964d31ebc6083033 kernel.org
https://git.kernel.org/stable/c/a7fa9460b86f810913b6779461d0448e7c11214c kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-31687
NVD Published Date:
04/27/2026
NVD Last Modified:
04/27/2026
Source:
kernel.org