Description
In the Linux kernel, the following vulnerability has been resolved:

mmc: core: Avoid bitfield RMW for claim/retune flags

Move claimed and retune control flags out of the bitfield word to
avoid unrelated RMW side effects in asynchronous contexts.

The host->claimed bit shared a word with retune flags. Writes to claimed
in __mmc_claim_host() or retune_now in mmc_mq_queue_rq() can overwrite
other bits when concurrent updates happen in other contexts, triggering
spurious WARN_ON(!host->claimed). Convert claimed, can_retune,
retune_now and retune_paused to bool to remove shared-word coupling.
Published: 2026-05-13
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from a race condition in the Linux kernel’s MMC subsystem where bitfield read‑modify‑write operations on the host-claimed flag and retune control bits shared a single word. Concurrent updates in asynchronous contexts could overwrite unrelated bits, leading to false WARN_ON messages and potential state corruption of MMC hosts. This faulty synchronization could cause incorrect driver behavior or kernel instability if the bit mis‑written triggers erroneous logic.

Affected Systems

The issue affects the Linux kernel’s MMC core module. Any installation of the kernel that includes the mmc subsystem is potentially impacted until the fixed commit is applied. Exact kernel releases are not specified in the data, so all kernel versions before the patch are considered vulnerable.

Risk and Exploitability

The CVSS score is 5.5, indicating moderate severity. EPSS is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting no known public exploit at this time. The flaw involves concurrent access to shared bitfields in the MMC subsystem; exploitation would likely require local or privileged access to the kernel, possibly through a malicious MMC device driver.

Generated by OpenCVE AI on May 14, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the mmc: core claim/retune flag fix.
  • If an immediate kernel upgrade is not possible, consider disabling or limiting access to MMC devices to prevent concurrent race conditions.
  • If you maintain a custom kernel, apply the patched changes from the referenced kernel commits to the MMC core source before rebooting the system.

Generated by OpenCVE AI on May 14, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-366
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mmc: core: Avoid bitfield RMW for claim/retune flags Move claimed and retune control flags out of the bitfield word to avoid unrelated RMW side effects in asynchronous contexts. The host->claimed bit shared a word with retune flags. Writes to claimed in __mmc_claim_host() or retune_now in mmc_mq_queue_rq() can overwrite other bits when concurrent updates happen in other contexts, triggering spurious WARN_ON(!host->claimed). Convert claimed, can_retune, retune_now and retune_paused to bool to remove shared-word coupling.
Title mmc: core: Avoid bitfield RMW for claim/retune flags
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-13T15:08:30.919Z

Reserved: 2026-05-01T14:12:56.012Z

Link: CVE-2026-43484

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-13T16:16:51.623

Modified: 2026-05-13T16:16:51.623

Link: CVE-2026-43484

cve-icon Redhat

Severity : Low

Publid Date: 2026-05-13T00:00:00Z

Links: CVE-2026-43484 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T13:30:06Z

Weaknesses