CVE-2023-52680

In the Linux kernel, the following vulnerability has been resolved: ALSA: scarlett2: Add missing error checks to *_ctl_get() The *_ctl_get() functions which call scarlett2_update_*() were not checking the return value. Fix to check the return value and pass to the caller.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Sep 2025, 16:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-252
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/3a09488f4f67f7ade59b8ac62a6c7fb29439cf51 - () https://git.kernel.org/stable/c/3a09488f4f67f7ade59b8ac62a6c7fb29439cf51 - Patch
References () https://git.kernel.org/stable/c/50603a67daef161c78c814580d57f7f0be57167e - () https://git.kernel.org/stable/c/50603a67daef161c78c814580d57f7f0be57167e - Patch
References () https://git.kernel.org/stable/c/773e38f73461ef2134a0d33a08f1668edde9b7c3 - () https://git.kernel.org/stable/c/773e38f73461ef2134a0d33a08f1668edde9b7c3 - Patch
References () https://git.kernel.org/stable/c/821fbaeaaae23d483d3df799fe91ec8045973ec3 - () https://git.kernel.org/stable/c/821fbaeaaae23d483d3df799fe91ec8045973ec3 - Patch
References () https://git.kernel.org/stable/c/cda7762bea857e6951315a2f7d0632ea1850ed43 - () https://git.kernel.org/stable/c/cda7762bea857e6951315a2f7d0632ea1850ed43 - Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3a09488f4f67f7ade59b8ac62a6c7fb29439cf51 - () https://git.kernel.org/stable/c/3a09488f4f67f7ade59b8ac62a6c7fb29439cf51 -
References () https://git.kernel.org/stable/c/50603a67daef161c78c814580d57f7f0be57167e - () https://git.kernel.org/stable/c/50603a67daef161c78c814580d57f7f0be57167e -
References () https://git.kernel.org/stable/c/773e38f73461ef2134a0d33a08f1668edde9b7c3 - () https://git.kernel.org/stable/c/773e38f73461ef2134a0d33a08f1668edde9b7c3 -
References () https://git.kernel.org/stable/c/821fbaeaaae23d483d3df799fe91ec8045973ec3 - () https://git.kernel.org/stable/c/821fbaeaaae23d483d3df799fe91ec8045973ec3 -
References () https://git.kernel.org/stable/c/cda7762bea857e6951315a2f7d0632ea1850ed43 - () https://git.kernel.org/stable/c/cda7762bea857e6951315a2f7d0632ea1850ed43 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: scarlett2: Agregar comprobaciones de errores faltantes a *_ctl_get() Las funciones *_ctl_get() que llaman a scarlett2_update_*() no estaban comprobando el valor de retorno. Corrija para verificar el valor de retorno y pasarlo a la persona que llama.

17 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 15:15

Updated : 2025-09-25 16:16


NVD link : CVE-2023-52680

Mitre link : CVE-2023-52680

CVE.ORG link : CVE-2023-52680


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-252

Unchecked Return Value