CVE-2024-40968

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> MIPS: Octeon: Add PCIe link status check<br /> <br /> The standard PCIe configuration read-write interface is used to<br /> access the configuration space of the peripheral PCIe devices<br /> of the mips processor after the PCIe link surprise down, it can<br /> generate kernel panic caused by "Data bus error". So it is<br /> necessary to add PCIe link status check for system protection.<br /> When the PCIe link is down or in training, assigning a value<br /> of 0 to the configuration address can prevent read-write behavior<br /> to the configuration space of peripheral PCIe devices, thereby<br /> preventing kernel panic.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.317 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.279 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.221 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.162 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.96 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.36 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.7 (excluding)