{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-40968","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-07-12T12:17:45.602Z","datePublished":"2024-07-12T12:32:07.476Z","dateUpdated":"2026-01-05T10:36:58.353Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-01-05T10:36:58.353Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nMIPS: Octeon: Add PCIe link status check\n\nThe standard PCIe configuration read-write interface is used to\naccess the configuration space of the peripheral PCIe devices\nof the mips processor after the PCIe link surprise down, it can\ngenerate kernel panic caused by \"Data bus error\". So it is\nnecessary to add PCIe link status check for system protection.\nWhen the PCIe link is down or in training, assigning a value\nof 0 to the configuration address can prevent read-write behavior\nto the configuration space of peripheral PCIe devices, thereby\npreventing kernel panic."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/mips/pci/pcie-octeon.c"],"versions":[{"version":"e8635b484f644c7873e6091f15330c49396f2cbc","lessThan":"6bff05aaa32c2f7e1f6e68e890876642159db419","status":"affected","versionType":"git"},{"version":"e8635b484f644c7873e6091f15330c49396f2cbc","lessThan":"64845ac64819683ad5e51b668b2ed56ee3386aee","status":"affected","versionType":"git"},{"version":"e8635b484f644c7873e6091f15330c49396f2cbc","lessThan":"6c1b9fe148a4e03bbfa234267ebb89f35285814a","status":"affected","versionType":"git"},{"version":"e8635b484f644c7873e6091f15330c49396f2cbc","lessThan":"25998f5613159fe35920dbd484fcac7ea3ad0799","status":"affected","versionType":"git"},{"version":"e8635b484f644c7873e6091f15330c49396f2cbc","lessThan":"d996deb80398a90dd3c03590e68dad543da87d62","status":"affected","versionType":"git"},{"version":"e8635b484f644c7873e6091f15330c49396f2cbc","lessThan":"1c33fd17383f48f679186c54df78542106deeaa0","status":"affected","versionType":"git"},{"version":"e8635b484f644c7873e6091f15330c49396f2cbc","lessThan":"38d647d509543e9434b3cc470b914348be271fe9","status":"affected","versionType":"git"},{"version":"e8635b484f644c7873e6091f15330c49396f2cbc","lessThan":"29b83a64df3b42c88c0338696feb6fdcd7f1f3b7","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/mips/pci/pcie-octeon.c"],"versions":[{"version":"2.6.31","status":"affected"},{"version":"0","lessThan":"2.6.31","status":"unaffected","versionType":"semver"},{"version":"4.19.317","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.279","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.221","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.162","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.96","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.36","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.9.7","lessThanOrEqual":"6.9.*","status":"unaffected","versionType":"semver"},{"version":"6.10","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"4.19.317"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"5.4.279"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"5.10.221"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"5.15.162"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.1.96"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.6.36"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.9.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419"},{"url":"https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee"},{"url":"https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a"},{"url":"https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799"},{"url":"https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62"},{"url":"https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0"},{"url":"https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9"},{"url":"https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7"}],"title":"MIPS: Octeon: Add PCIe link status check","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:58:33.237Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-40968","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T17:03:03.974651Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:34:22.885Z"}}]}}