CVE-2024-38619

In the Linux kernel, the following vulnerability has been resolved: usb-storage: alauda: Check whether the media is initialized The member "uzonesize" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba(). - Add a member "media_initialized" to struct alauda_info. - Change a condition in alauda_check_media() to ensure the first initialization. - Add an error check for the return value of alauda_init_media().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*

History

03 Oct 2025, 16:08

Type Values Removed Values Added
CWE CWE-908
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30 - () https://git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30 - Patch
References () https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4 - () https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4 - Patch
References () https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1 - () https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1 - Patch
References () https://git.kernel.org/stable/c/3eee13ab67f65606faa66e0c3c729e4f514838fd - () https://git.kernel.org/stable/c/3eee13ab67f65606faa66e0c3c729e4f514838fd - Patch
References () https://git.kernel.org/stable/c/51fe16c058acb22f847e69bc598066ed0bcd5c15 - () https://git.kernel.org/stable/c/51fe16c058acb22f847e69bc598066ed0bcd5c15 - Patch
References () https://git.kernel.org/stable/c/e0aab7b07a9375337847c9d74a5ec044071e01c8 - () https://git.kernel.org/stable/c/e0aab7b07a9375337847c9d74a5ec044071e01c8 - Patch
References () https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361 - () https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361 - Patch
References () https://git.kernel.org/stable/c/f68820f1256b21466ff094dd97f243b7e708f9c1 - () https://git.kernel.org/stable/c/f68820f1256b21466ff094dd97f243b7e708f9c1 - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30 - () https://git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30 -
References () https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4 - () https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4 -
References () https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1 - () https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1 -
References () https://git.kernel.org/stable/c/3eee13ab67f65606faa66e0c3c729e4f514838fd - () https://git.kernel.org/stable/c/3eee13ab67f65606faa66e0c3c729e4f514838fd -
References () https://git.kernel.org/stable/c/51fe16c058acb22f847e69bc598066ed0bcd5c15 - () https://git.kernel.org/stable/c/51fe16c058acb22f847e69bc598066ed0bcd5c15 -
References () https://git.kernel.org/stable/c/e0aab7b07a9375337847c9d74a5ec044071e01c8 - () https://git.kernel.org/stable/c/e0aab7b07a9375337847c9d74a5ec044071e01c8 -
References () https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361 - () https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361 -
References () https://git.kernel.org/stable/c/f68820f1256b21466ff094dd97f243b7e708f9c1 - () https://git.kernel.org/stable/c/f68820f1256b21466ff094dd97f243b7e708f9c1 -

05 Jul 2024, 08:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3eee13ab67f65606faa66e0c3c729e4f514838fd -
  • () https://git.kernel.org/stable/c/51fe16c058acb22f847e69bc598066ed0bcd5c15 -
  • () https://git.kernel.org/stable/c/e0aab7b07a9375337847c9d74a5ec044071e01c8 -
  • () https://git.kernel.org/stable/c/f68820f1256b21466ff094dd97f243b7e708f9c1 -

21 Jun 2024, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4 -
  • () https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1 -
  • () https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361 -

20 Jun 2024, 12:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: usb-storage: alauda: compruebe si el medio está inicializado. El miembro "uzonesize" de la estructura alauda_info permanecerá 0 si alauda_init_media() falla, lo que podría provocar errores de división en alauda_read_data() y alauda_write_lba(). - Agregue un miembro "media_initialized" a la estructura alauda_info. - Cambiar una condición en alauda_check_media() para asegurar la primera inicialización. - Agregue una verificación de errores para el valor de retorno de alauda_init_media().

20 Jun 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 07:15

Updated : 2025-10-03 16:08


NVD link : CVE-2024-38619

Mitre link : CVE-2024-38619

CVE.ORG link : CVE-2024-38619


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource