In the Linux kernel, the following vulnerability has been resolved:
MIPS: Octeon: Add PCIe link status check
The standard PCIe configuration read-write interface is used to
access the configuration space of the peripheral PCIe devices
of the mips processor after the PCIe link surprise down, it can
generate kernel panic caused by “Data bus error”. So it is
necessary to add PCIe link status check for system protection.
When the PCIe link is down or in training, assigning a value
of 0 to the configuration address can prevent read-write behavior
to the configuration space of peripheral PCIe devices, thereby
preventing kernel panic.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 (6.10-rc1)
git.kernel.org/stable/c/1c33fd17383f48f679186c54df78542106deeaa0
git.kernel.org/stable/c/25998f5613159fe35920dbd484fcac7ea3ad0799
git.kernel.org/stable/c/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7
git.kernel.org/stable/c/38d647d509543e9434b3cc470b914348be271fe9
git.kernel.org/stable/c/64845ac64819683ad5e51b668b2ed56ee3386aee
git.kernel.org/stable/c/6bff05aaa32c2f7e1f6e68e890876642159db419
git.kernel.org/stable/c/6c1b9fe148a4e03bbfa234267ebb89f35285814a
git.kernel.org/stable/c/d996deb80398a90dd3c03590e68dad543da87d62
launchpad.net/bugs/cve/CVE-2024-40968
nvd.nist.gov/vuln/detail/CVE-2024-40968
security-tracker.debian.org/tracker/CVE-2024-40968
www.cve.org/CVERecord?id=CVE-2024-40968