-

CVE-2026-43484

mmc: core: Avoid bitfield RMW for claim/retune flags

In the Linux kernel, the following vulnerability has been resolved:

mmc: core: Avoid bitfield RMW for claim/retune flags

Move claimed and retune control flags out of the bitfield word to
avoid unrelated RMW side effects in asynchronous contexts.

The host->claimed bit shared a word with retune flags. Writes to claimed
in __mmc_claim_host() or retune_now in mmc_mq_queue_rq() can overwrite
other bits when concurrent updates happen in other contexts, triggering
spurious WARN_ON(!host->claimed). Convert claimed, can_retune,
retune_now and retune_paused to bool to remove shared-word coupling.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 6c0cedd1ef9527ef13e66875746570e76a3188a7
Version < 41dce4dae583a8ce06a7ebf4ce704c46a142957c
Status affected
Version 6c0cedd1ef9527ef13e66875746570e76a3188a7
Version < bb7fc2498c3bb25fa6a91f22f4760005325cfbd5
Status affected
Version 6c0cedd1ef9527ef13e66875746570e76a3188a7
Version < 270277c2ab631044867adb1bd2f2433d3892de6e
Status affected
Version 6c0cedd1ef9527ef13e66875746570e76a3188a7
Version < 45038e03f15e992c48603fff8c6b1c9be5397ac9
Status affected
Version 6c0cedd1ef9527ef13e66875746570e76a3188a7
Version < 0e06cc511c61cff1591e5435a207759adcc76b6d
Status affected
Version 6c0cedd1ef9527ef13e66875746570e76a3188a7
Version < d3a3caf44c8ec26f5d63dc17c1c7242effa60ebc
Status affected
Version 6c0cedd1ef9527ef13e66875746570e76a3188a7
Version < 901084c51a0a8fb42a3f37d2e9c62083c495f824
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.15
Status affected
Version 0
Version < 4.15
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.19
Status unaffected
Version <= 6.19.*
Version 6.19.9
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.071
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.