CVE-2025-71200

Source
https://cve.org/CVERecord?id=CVE-2025-71200
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71200.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-71200
Downstream
Related
Published
2026-02-14T15:09:45.689Z
Modified
2026-04-02T17:30:51.151325995Z
Summary
mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode
Details

In the Linux kernel, the following vulnerability has been resolved:

mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode

When operating in HS200 or HS400 timing modes, reducing the clock frequency below 52MHz will lead to link broken as the Rockchip DWC MSHC controller requires maintaining a minimum clock of 52MHz in these modes.

Add a check to prevent illegal clock reduction through debugfs:

root@debian:/# echo 50000000 > /sys/kernel/debug/mmc0/clock root@debian:/# [ 30.090146] mmc0: running CQE recovery mmc0: cqhci: Failed to halt mmc0: cqhci: spurious TCN for tag 0 WARNING: drivers/mmc/host/cqhci-core.c:797 at cqhciirq+0x254/0x818, CPU#1: kworker/1:0H/24 Modules linked in: CPU: 1 UID: 0 PID: 24 Comm: kworker/1:0H Not tainted 6.19.0-rc1-00001-g09db0998649d-dirty #204 PREEMPT Hardware name: Rockchip RK3588 EVB1 V10 Board (DT) Workqueue: kblockd blkmqrunworkfn pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : cqhciirq+0x254/0x818 lr : cqhci_irq+0x254/0x818 ...

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71200.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c6f361cba51c536e7a6af31973c6a4e5d7e4e2e4
Fixed
59b8a1ca6df4db2ca250e9eeab74e2b0068d69e9
Fixed
f2677d6e2bbc5ba2030825522d2afd0542b038a3
Fixed
de0ad7156036a50982bcb75a080e4af284502be2
Fixed
36be050f21dea7a3a76dff5a031da6274e8ee468
Fixed
3009738a855cf938bbfc9078bec725031ae623a4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71200.json"