CVE-2026-43081
Description
In the Linux kernel, the following vulnerability has been resolved:
net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+
Fix the field masks to match the hardware layout documented in downstream GSI (GSI_V3_0_EE_n_GSI_EE_GENERIC_CMD_*).
Notably this fixes a WARN I was seeing when I tried to send "stop" to the MPSS remoteproc while IPA was up.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Incorrect field masks in the IPA GENERIC_CMD register for Linux kernel v5.0+ can cause a WARN when stopping the MPSS remoteproc.
Vulnerability
In the Linux kernel's IPA (IPA) driver, the field masks for the GENERIC_CMD register were incorrectly defined for IPA v5.0 and later. The masks did not match the hardware layout documented in the downstream GSI (GSI_V3_0_EE_n_GSI_EE_GENERIC_CMD_*) specification. This mismatch caused the driver to misinterpret the register fields, leading to incorrect command encoding.
Exploitation
The vulnerability is triggered when the IPA driver sends a "stop" command to the MPSS (Modem Processor Subsystem) remoteproc while IPA is active. No special privileges beyond the ability to trigger IPA operations are required; the issue manifests during normal system operation when the modem is stopped. The incorrect field masks cause the driver to write invalid values to the GENERIC_CMD register, which can lead to a kernel WARN (a warning trace) being emitted.
Impact
An attacker who can trigger the IPA stop sequence (e.g., by forcing a modem reset or through a crafted system call) could cause a kernel WARN, which may result in a denial of service (system instability or panic) depending on the kernel configuration. The WARN itself indicates a bug that could be leveraged for further exploitation, though the primary impact is system disruption.
Mitigation
The fix has been applied to the Linux kernel stable tree via commits [1][2][3][4]. Users should update to a kernel version containing these patches. No workaround is available other than avoiding the IPA stop sequence, which is not practical for normal operation.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/2aa50d2c1f631b405849da246043c6f683af7489nvd
- git.kernel.org/stable/c/9709b56d908acc120fe8b4ae250b3c9d749ea832nvd
- git.kernel.org/stable/c/a7d326dfb13b5a0763eccfd78836fe15199fc499nvd
- git.kernel.org/stable/c/bafc45ea30d297002750396d5f10e3018bf2cd60nvd
- git.kernel.org/stable/c/d1c66396796f23f7201b1addf06f62515035354dnvd
News mentions
0No linked articles in our index yet.