CVE-2026-43484
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/05/2026
Última modificación:
13/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mmc: core: Avoid bitfield RMW for claim/retune flags<br />
<br />
Move claimed and retune control flags out of the bitfield word to<br />
avoid unrelated RMW side effects in asynchronous contexts.<br />
<br />
The host->claimed bit shared a word with retune flags. Writes to claimed<br />
in __mmc_claim_host() or retune_now in mmc_mq_queue_rq() can overwrite<br />
other bits when concurrent updates happen in other contexts, triggering<br />
spurious WARN_ON(!host->claimed). Convert claimed, can_retune,<br />
retune_now and retune_paused to bool to remove shared-word coupling.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0e06cc511c61cff1591e5435a207759adcc76b6d
- https://git.kernel.org/stable/c/270277c2ab631044867adb1bd2f2433d3892de6e
- https://git.kernel.org/stable/c/41dce4dae583a8ce06a7ebf4ce704c46a142957c
- https://git.kernel.org/stable/c/45038e03f15e992c48603fff8c6b1c9be5397ac9
- https://git.kernel.org/stable/c/901084c51a0a8fb42a3f37d2e9c62083c495f824
- https://git.kernel.org/stable/c/bb7fc2498c3bb25fa6a91f22f4760005325cfbd5
- https://git.kernel.org/stable/c/d3a3caf44c8ec26f5d63dc17c1c7242effa60ebc



