CVE-2024-40968

In the Linux kernel, the following vulnerability has been resolved: MIPS: Octeon: Add PCIe link status check The standard PCIe configuration read-write interface is used to access the configuration space of the peripheral PCIe devices of the mips processor after the PCIe link surprise down, it can generate kernel panic caused by "Data bus error". So it is necessary to add PCIe link status check for system protection. When the PCIe link is down or in training, assigning a value of 0 to the configuration address can prevent read-write behavior to the configuration space of peripheral PCIe devices, thereby preventing kernel panic.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Sep 2025, 14:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-754
References () https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0 - () https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0 - Patch
References () https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799 - () https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799 - Patch
References () https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 - () https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 - Patch
References () https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9 - () https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9 - Patch
References () https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee - () https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee - Patch
References () https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419 - () https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419 - Patch
References () https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a - () https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a - Patch
References () https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62 - () https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62 - Patch

21 Nov 2024, 09:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0 - () https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0 -
References () https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799 - () https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799 -
References () https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 - () https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 -
References () https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9 - () https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9 -
References () https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee - () https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee -
References () https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419 - () https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419 -
References () https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a - () https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a -
References () https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62 - () https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: MIPS: Octeon: agregar verificación de estado del enlace PCIe La interfaz de lectura y escritura de configuración PCIe estándar se utiliza para acceder al espacio de configuración de los dispositivos PCIe periféricos del procesador mips después de la sorpresa del enlace PCIe. inactivo, puede generar pánico en el kernel causado por un "Error del bus de datos". Por lo tanto, es necesario agregar una verificación del estado del enlace PCIe para proteger el sistema. Cuando el enlace PCIe está inactivo o en entrenamiento, asignar un valor de 0 a la dirección de configuración puede evitar el comportamiento de lectura y escritura en el espacio de configuración de los dispositivos PCIe periféricos, evitando así el pánico del kernel.

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-09-17 14:44


NVD link : CVE-2024-40968

Mitre link : CVE-2024-40968

CVE.ORG link : CVE-2024-40968


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions