CVE-2024-40968

Source
https://cve.org/CVERecord?id=CVE-2024-40968
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40968.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-40968
Downstream
Published
2024-07-12T12:32:07.476Z
Modified
2026-03-13T07:56:06.792422Z
Summary
MIPS: Octeon: Add PCIe link status check
Details

In the Linux kernel, the following vulnerability has been resolved:

MIPS: Octeon: Add PCIe link status check

The standard PCIe configuration read-write interface is used to access the configuration space of the peripheral PCIe devices of the mips processor after the PCIe link surprise down, it can generate kernel panic caused by "Data bus error". So it is necessary to add PCIe link status check for system protection. When the PCIe link is down or in training, assigning a value of 0 to the configuration address can prevent read-write behavior to the configuration space of peripheral PCIe devices, thereby preventing kernel panic.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40968.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e8635b484f644c7873e6091f15330c49396f2cbc
Fixed
6bff05aaa32c2f7e1f6e68e890876642159db419
Fixed
64845ac64819683ad5e51b668b2ed56ee3386aee
Fixed
6c1b9fe148a4e03bbfa234267ebb89f35285814a
Fixed
25998f5613159fe35920dbd484fcac7ea3ad0799
Fixed
d996deb80398a90dd3c03590e68dad543da87d62
Fixed
1c33fd17383f48f679186c54df78542106deeaa0
Fixed
38d647d509543e9434b3cc470b914348be271fe9
Fixed
29b83a64df3b42c88c0338696feb6fdcd7f1f3b7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40968.json"