Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43081
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 07:40
Updated At-06 May, 2026 | 07:40
Rejected At-
▼CVE Numbering Authority (CNA)
net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+

In the Linux kernel, the following vulnerability has been resolved: net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+ Fix the field masks to match the hardware layout documented in downstream GSI (GSI_V3_0_EE_n_GSI_EE_GENERIC_CMD_*). Notably this fixes a WARN I was seeing when I tried to send "stop" to the MPSS remoteproc while IPA was up.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ipa/reg/gsi_reg-v5.0.c
Default Status
unaffected
Versions
Affected
  • From faf0678ec8a0aa9039d8b188d012206abd67dd5c before a7d326dfb13b5a0763eccfd78836fe15199fc499 (git)
  • From faf0678ec8a0aa9039d8b188d012206abd67dd5c before d1c66396796f23f7201b1addf06f62515035354d (git)
  • From faf0678ec8a0aa9039d8b188d012206abd67dd5c before bafc45ea30d297002750396d5f10e3018bf2cd60 (git)
  • From faf0678ec8a0aa9039d8b188d012206abd67dd5c before 2aa50d2c1f631b405849da246043c6f683af7489 (git)
  • From faf0678ec8a0aa9039d8b188d012206abd67dd5c before 9709b56d908acc120fe8b4ae250b3c9d749ea832 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ipa/reg/gsi_reg-v5.0.c
Default Status
affected
Versions
Affected
  • 6.4
Unaffected
  • From 0 before 6.4 (semver)
  • From 6.6.136 through 6.6.* (semver)
  • From 6.12.83 through 6.12.* (semver)
  • From 6.18.24 through 6.18.* (semver)
  • From 6.19.14 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a7d326dfb13b5a0763eccfd78836fe15199fc499
N/A
https://git.kernel.org/stable/c/d1c66396796f23f7201b1addf06f62515035354d
N/A
https://git.kernel.org/stable/c/bafc45ea30d297002750396d5f10e3018bf2cd60
N/A
https://git.kernel.org/stable/c/2aa50d2c1f631b405849da246043c6f683af7489
N/A
https://git.kernel.org/stable/c/9709b56d908acc120fe8b4ae250b3c9d749ea832
N/A
Hyperlink: https://git.kernel.org/stable/c/a7d326dfb13b5a0763eccfd78836fe15199fc499
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d1c66396796f23f7201b1addf06f62515035354d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bafc45ea30d297002750396d5f10e3018bf2cd60
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2aa50d2c1f631b405849da246043c6f683af7489
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9709b56d908acc120fe8b4ae250b3c9d749ea832
Resource: N/A
Details not found