CVE-2024-40968

In the Linux kernel, the following vulnerability has been resolved: MIPS: Octeon: Add PCIe link status check The standard PCIe configuration read-write interface is used to access the configuration space of the peripheral PCIe devices of the mips processor after the PCIe link surprise down, it can generate kernel panic caused by "Data bus error". So it is necessary to add PCIe link status check for system protection. When the PCIe link is down or in training, assigning a value of 0 to the configuration address can prevent read-write behavior to the configuration space of peripheral PCIe devices, thereby preventing kernel panic.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Sep 2025, 14:44

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0 - () https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0 - Patch
References () https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799 - () https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799 - Patch
References () https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 - () https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 - Patch
References () https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9 - () https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9 - Patch
References () https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee - () https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee - Patch
References () https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419 - () https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419 - Patch
References () https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a - () https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a - Patch
References () https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62 - () https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-754

Information

Published : 2024-07-12 13:15

Updated : 2025-09-17 14:44


NVD link : CVE-2024-40968

Mitre link : CVE-2024-40968

CVE.ORG link : CVE-2024-40968


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions