mmc: core: Avoid bitfield RMW for claim/retune flags

Summary

CVECVE-2026-43484
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-13 16:16:51 UTC
Updated2026-05-13 16:16:51 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: mmc: core: Avoid bitfield RMW for claim/retune flags Move claimed and retune control flags out of the bitfield word to avoid unrelated RMW side effects in asynchronous contexts. The host->claimed bit shared a word with retune flags. Writes to claimed in __mmc_claim_host() or retune_now in mmc_mq_queue_rq() can overwrite other bits when concurrent updates happen in other contexts, triggering spurious WARN_ON(!host->claimed). Convert claimed, can_retune, retune_now and retune_paused to bool to remove shared-word coupling.

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 6c0cedd1ef9527ef13e66875746570e76a3188a7 41dce4dae583a8ce06a7ebf4ce704c46a142957c git Not specified
CNA Linux Linux affected 6c0cedd1ef9527ef13e66875746570e76a3188a7 bb7fc2498c3bb25fa6a91f22f4760005325cfbd5 git Not specified
CNA Linux Linux affected 6c0cedd1ef9527ef13e66875746570e76a3188a7 270277c2ab631044867adb1bd2f2433d3892de6e git Not specified
CNA Linux Linux affected 6c0cedd1ef9527ef13e66875746570e76a3188a7 45038e03f15e992c48603fff8c6b1c9be5397ac9 git Not specified
CNA Linux Linux affected 6c0cedd1ef9527ef13e66875746570e76a3188a7 0e06cc511c61cff1591e5435a207759adcc76b6d git Not specified
CNA Linux Linux affected 6c0cedd1ef9527ef13e66875746570e76a3188a7 d3a3caf44c8ec26f5d63dc17c1c7242effa60ebc git Not specified
CNA Linux Linux affected 6c0cedd1ef9527ef13e66875746570e76a3188a7 901084c51a0a8fb42a3f37d2e9c62083c495f824 git Not specified
CNA Linux Linux affected 4.15 Not specified
CNA Linux Linux unaffected 4.15 semver Not specified
CNA Linux Linux unaffected 5.15.203 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.167 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.130 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.78 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.19 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.9 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/bb7fc2498c3bb25fa6a91f22f4760005325cfbd5 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/d3a3caf44c8ec26f5d63dc17c1c7242effa60ebc 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/0e06cc511c61cff1591e5435a207759adcc76b6d 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/901084c51a0a8fb42a3f37d2e9c62083c495f824 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/270277c2ab631044867adb1bd2f2433d3892de6e 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/45038e03f15e992c48603fff8c6b1c9be5397ac9 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/41dce4dae583a8ce06a7ebf4ce704c46a142957c 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report