The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-43484

CVE-2026-43484: Linux Kernel Race Condition Vulnerability

CVE-2026-43484 is a race condition flaw in the Linux kernel's MMC core that causes bitfield read-modify-write conflicts during concurrent updates. This article covers technical details, affected versions, and mitigation.

Published: May 17, 2026

CVE-2026-43484 Overview

CVE-2026-43484 is a race condition in the Linux kernel MultiMediaCard (MMC) core subsystem. The vulnerability stems from concurrent read-modify-write (RMW) operations against a shared bitfield word containing the claimed, can_retune, retune_now, and retune_paused flags. When asynchronous contexts update one bit, they can overwrite unrelated bits in the same word. This triggers spurious WARN_ON(!host->claimed) conditions and can desynchronize host claim state with the storage stack. The fix converts the affected flags to bool to remove shared-word coupling.

Critical Impact

Concurrent writes to MMC host flags can corrupt claim and retune state, producing kernel warnings and unpredictable behavior in the block I/O path on systems using MMC or SD storage.

Affected Products

  • Linux kernel mmc core subsystem (drivers/mmc/core/)
  • Stable kernel branches receiving backports identified by commits 0e06cc5, 270277c, 41dce4d, 45038e0, 901084c, bb7fc24, and d3a3caf
  • Systems using MMC, SD, or eMMC storage devices via the kernel MMC stack

Discovery Timeline

  • 2026-05-13 - CVE-2026-43484 published to NVD
  • 2026-05-13 - Last updated in NVD database

Technical Details for CVE-2026-43484

Vulnerability Analysis

The Linux kernel MMC core tracks per-host state using bitfield members packed into a single machine word. The host->claimed bit, used to serialize access to an MMC host across threads, shared a word with retune control bits including can_retune, retune_now, and retune_paused.

C bitfield assignment is not atomic. The compiler emits a load-modify-store sequence over the entire containing word. When __mmc_claim_host() updates claimed while mmc_mq_queue_rq() concurrently updates retune_now, one writer can clobber the other's bit. This produces inconsistent state and triggers WARN_ON(!host->claimed) checks elsewhere in the stack.

Root Cause

The root cause is unsafe concurrent access to bitfield members that share storage. The MMC core relied on these flags being updated from contexts assumed to be serialized, but request queue handling in mmc_mq_queue_rq() runs asynchronously relative to claim/release paths. Without atomic primitives or per-flag storage, the RMW window allowed lost updates.

Attack Vector

This is a concurrency defect rather than a directly exploitable memory corruption vector. Triggering the race requires legitimate kernel I/O activity against an MMC host under contention. The observable effects are kernel warnings, log noise, and potential denial of service through state desynchronization in the storage subsystem. No remote or unprivileged attack vector is described in the upstream commit.

The upstream fix moves claimed, can_retune, retune_now, and retune_paused out of the shared bitfield and stores them as discrete bool fields. This eliminates the shared-word coupling without requiring locking changes. See the kernel commit references for the exact diff.

Detection Methods for CVE-2026-43484

Indicators of Compromise

  • Kernel log entries containing WARN_ON(!host->claimed) originating from drivers/mmc/core/
  • Repeated MMC subsystem warnings in dmesg correlated with high I/O load on SD or eMMC devices
  • Unexpected MMC retune events or stalled block I/O on affected hosts

Detection Strategies

  • Inventory running kernels and compare against the patched stable releases referenced in the kernel.org commit list
  • Monitor dmesg and journalctl -k for MMC core warnings on systems with embedded storage or SD card readers
  • Correlate kernel warnings with storage subsystem performance telemetry to identify recurring race triggers

Monitoring Recommendations

  • Forward kernel logs to a centralized log platform and alert on mmc_core warnings
  • Track kernel package versions across fleet endpoints and flag hosts running pre-patch builds
  • Establish baselines for MMC subsystem warning frequency to detect regression after kernel updates

How to Mitigate CVE-2026-43484

Immediate Actions Required

  • Identify all Linux systems using MMC, SD, or eMMC storage, including embedded and IoT devices
  • Apply the stable kernel update containing the upstream fix from your distribution vendor
  • Reboot affected hosts after kernel installation so the patched MMC core is loaded

Patch Information

The fix is committed to mainline and backported across stable trees. Reference commits: Kernel Patch 0e06cc5, Kernel Patch 270277c, Kernel Patch 41dce4d, Kernel Patch 45038e0, Kernel Patch 901084c, Kernel Patch bb7fc24, and Kernel Patch d3a3caf. Install the kernel package provided by your Linux distribution that incorporates these commits.

Workarounds

  • No supported runtime workaround exists; kernel update is required to remove the shared-word coupling
  • On systems where MMC storage is not in use, unloading the mmc_core and mmc_block modules removes exposure to the race path
  • Reduce concurrent MMC I/O load where feasible to lower the probability of triggering the race until patches are deployed
bash
# Verify kernel version and check for MMC core warnings
uname -r
dmesg | grep -i mmc
journalctl -k --since "24 hours ago" | grep -E "mmc|WARN"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Patch 0e06cc5

  • Kernel Patch 270277c

  • Kernel Patch 41dce4d

  • Kernel Patch 45038e0

  • Kernel Patch 901084c

  • Kernel Patch bb7fc24

  • Kernel Patch d3a3caf
  • Related CVEs
  • CVE-2026-43342: Linux Kernel Race Condition Vulnerability

  • CVE-2026-43340: Linux Kernel Race Condition Vulnerability

  • CVE-2026-43353: Linux Kernel Race Condition Vulnerability

  • CVE-2026-43318: Linux Kernel Race Condition Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English