CVE-2026-43081
Received Received - Intake
IPA v5.0+ GENERIC_CMD Register Field Mask Fix in Linux Kernel

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+ Fix the field masks to match the hardware layout documented in downstream GSI (GSI_V3_0_EE_n_GSI_EE_GENERIC_CMD_*). Notably this fixes a WARN I was seeing when I tried to send "stop" to the MPSS remoteproc while IPA was up.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel From 5.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability relates to the Linux kernel's IPA (IP Accelerator) component, specifically for version 5.0 and above. The issue involved incorrect register field masks in the GENERIC_CMD register, which did not match the hardware layout as documented in the downstream GSI (Generic Software Interface). This mismatch caused warnings when attempting to send a "stop" command to the MPSS remote processor while the IPA was active.


How can this vulnerability impact me? :

The impact of this vulnerability is primarily related to system stability and proper hardware communication. Incorrect register field masks could cause warnings or errors when controlling the MPSS remote processor via the IPA, potentially leading to unexpected behavior or difficulties in managing the processor state.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart