Use of Uninitialized Variable Affecting bpftool package, versions *
Threat Intelligence
EPSS
0.04% (15th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-BPFTOOL-7297910
- published 20 Jun 2024
- disclosed 20 Jun 2024
Introduced: 20 Jun 2024
CVE-2024-38619 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
bpftool
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bpftool
package and not the bpftool
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
usb-storage: alauda: Check whether the media is initialized
The member "uzonesize" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba().
- Add a member "media_initialized" to struct alauda_info.
- Change a condition in alauda_check_media() to ensure the first initialization.
- Add an error check for the return value of alauda_init_media().
References
- https://access.redhat.com/security/cve/CVE-2024-38619
- https://git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30
- https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4
- https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1
- https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361
- https://git.kernel.org/stable/c/3eee13ab67f65606faa66e0c3c729e4f514838fd
- https://git.kernel.org/stable/c/51fe16c058acb22f847e69bc598066ed0bcd5c15
- https://git.kernel.org/stable/c/e0aab7b07a9375337847c9d74a5ec044071e01c8
- https://git.kernel.org/stable/c/f68820f1256b21466ff094dd97f243b7e708f9c1
CVSS Scores
version 3.1