VYPR
Medium severity5.5NVD Advisory· Published Jun 20, 2024· Updated May 12, 2026

CVE-2024-38619

CVE-2024-38619

Description

In the Linux kernel, the following vulnerability has been resolved:

usb-storage: alauda: Check whether the media is initialized

The member "uzonesize" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba(). - Add a member "media_initialized" to struct alauda_info. - Change a condition in alauda_check_media() to ensure the first initialization. - Add an error check for the return value of alauda_init_media().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's usb-storage alauda driver, a missing initialization check can cause divide-by-zero errors, leading to a denial of service.

Root

Cause The usb-storage subdriver alauda initializes a media structure via alauda_init_media(). If this function fails, the member uzonesize of struct alauda_info remains zero. Subsequent calls to alauda_read_data() and alauda_write_lba() use uzonesize in division operations without validation, leading to a divide-by-zero error [4].

Exploitation

An attacker with physical access to the system can plug in a malicious USB storage device that triggers the alauda driver and causes alauda_init_media() to fail (e.g., by not responding properly). No special privileges are required beyond the ability to connect a USB device. The attack surface is limited to systems that have the alauda driver loaded and an affected USB device connected.

Impact

Successful exploitation results in a kernel panic or an oops due to a divide error, causing a denial of service (DoS) condition. The vulnerability does not appear to allow code execution or privilege escalation.

Mitigation

The fix introduces a media_initialized flag to struct alauda_info and adds checks in alauda_check_media() to ensure that operations are only performed after successful initialization. The patch is available in the Linux kernel git repository [4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

181

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.