In the Linux kernel, the following vulnerability has been resolved:
MIPS: Octeon: Add PCIe link status check
The standard PCIe configuration read-write interface is used to
access the configuration space of the peripheral PCIe devices
of the mips processor after the PCIe link surprise down, it can
generate kernel panic caused by "Data bus error". So it is
necessary to add PCIe link status check for system protection.
When the PCIe link is down or in training, assigning a value
of 0 to the configuration address can prevent read-write behavior
to the configuration space of peripheral PCIe devices, thereby
preventing kernel panic.
References
Configurations
Configuration 1 (hide)
|
History
17 Sep 2025, 14:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0 - Patch | |
References | () https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799 - Patch | |
References | () https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 - Patch | |
References | () https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9 - Patch | |
References | () https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee - Patch | |
References | () https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419 - Patch | |
References | () https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a - Patch | |
References | () https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62 - Patch | |
CWE | CWE-754 | |
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0 - | |
References | () https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799 - | |
References | () https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 - | |
References | () https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9 - | |
References | () https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee - | |
References | () https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419 - | |
References | () https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a - | |
References | () https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62 - | |
Summary |
|
12 Jul 2024, 16:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-12 13:15
Updated : 2025-09-17 14:44
NVD link : CVE-2024-40968
Mitre link : CVE-2024-40968
CVE.ORG link : CVE-2024-40968
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions