Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-52674
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-17 May, 2024 | 14:24
Updated At-04 May, 2025 | 07:41
Rejected At-
▼CVE Numbering Authority (CNA)
ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()

In the Linux kernel, the following vulnerability has been resolved: ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put() Ensure the value passed to scarlett2_mixer_ctl_put() is between 0 and SCARLETT2_MIXER_MAX_VALUE so we don't attempt to access outside scarlett2_mixer_values[].

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • sound/usb/mixer_scarlett2.c
Default Status
unaffected
Versions
Affected
  • From 9e4d5c1be21f0c00e747e92186784f3298309b3e before e517645ead5ea22c69d2a44694baa23fe1ce7c2b (git)
  • From 9e4d5c1be21f0c00e747e92186784f3298309b3e before d8d8897d65061cbe36bf2909057338303a904810 (git)
  • From 9e4d5c1be21f0c00e747e92186784f3298309b3e before 03035872e17897ba89866940bbc9cefca601e572 (git)
  • From 9e4d5c1be21f0c00e747e92186784f3298309b3e before ad945ea8d47dd4454c271510bea24850119847c2 (git)
  • From 9e4d5c1be21f0c00e747e92186784f3298309b3e before 04f8f053252b86c7583895c962d66747ecdc61b7 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • sound/usb/mixer_scarlett2.c
Default Status
affected
Versions
Affected
  • 5.4
Unaffected
  • From 0 before 5.4 (semver)
  • From 5.15.148 through 5.15.* (semver)
  • From 6.1.75 through 6.1.* (semver)
  • From 6.6.14 through 6.6.* (semver)
  • From 6.7.2 through 6.7.* (semver)
  • From 6.8 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/e517645ead5ea22c69d2a44694baa23fe1ce7c2b
N/A
https://git.kernel.org/stable/c/d8d8897d65061cbe36bf2909057338303a904810
N/A
https://git.kernel.org/stable/c/03035872e17897ba89866940bbc9cefca601e572
N/A
https://git.kernel.org/stable/c/ad945ea8d47dd4454c271510bea24850119847c2
N/A
https://git.kernel.org/stable/c/04f8f053252b86c7583895c962d66747ecdc61b7
N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-noinfoCWE-noinfo Not enough information
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/e517645ead5ea22c69d2a44694baa23fe1ce7c2b
x_transferred
https://git.kernel.org/stable/c/d8d8897d65061cbe36bf2909057338303a904810
x_transferred
https://git.kernel.org/stable/c/03035872e17897ba89866940bbc9cefca601e572
x_transferred
https://git.kernel.org/stable/c/ad945ea8d47dd4454c271510bea24850119847c2
x_transferred
https://git.kernel.org/stable/c/04f8f053252b86c7583895c962d66747ecdc61b7
x_transferred
Details not found