In the Linux kernel, the following vulnerability has been resolved: usb-storage: alauda: Check whether the media is initialized The member “uzonesize” of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba(). - Add a member “media_initialized” to struct alauda_info. - Change a condition in alauda_check_media() to ensure the first initialization. - Add an error check for the return value of alauda_init_media().
git.kernel.org/linus/16637fea001ab3c8df528a8995b3211906165a30
git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30
ubuntu.com/security/CVE-2024-38619
ubuntu.com/security/notices/USN-6999-1
ubuntu.com/security/notices/USN-6999-2
ubuntu.com/security/notices/USN-7003-1
ubuntu.com/security/notices/USN-7003-2
ubuntu.com/security/notices/USN-7003-3
ubuntu.com/security/notices/USN-7004-1
ubuntu.com/security/notices/USN-7005-1
ubuntu.com/security/notices/USN-7005-2
ubuntu.com/security/notices/USN-7006-1
ubuntu.com/security/notices/USN-7007-1
ubuntu.com/security/notices/USN-7007-2
ubuntu.com/security/notices/USN-7007-3
ubuntu.com/security/notices/USN-7008-1
ubuntu.com/security/notices/USN-7009-1
ubuntu.com/security/notices/USN-7009-2
ubuntu.com/security/notices/USN-7019-1
ubuntu.com/security/notices/USN-7029-1
www.cve.org/CVERecord?id=CVE-2024-38619