CVE-2023-52868

Source
https://cve.org/CVERecord?id=CVE-2023-52868
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52868.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52868
Downstream
Related
Published
2024-05-21T15:31:58.530Z
Modified
2026-03-13T07:48:13.670594Z
Summary
thermal: core: prevent potential string overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

thermal: core: prevent potential string overflow

The dev->id value comes from idaalloc() so it's a number between zero and INTMAX. If it's too high then these sprintf()s will overflow.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52868.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
203d3d4aa482339b4816f131f713e1b8ee37f6dd
Fixed
b55f0a9f865be75ca1019aad331f3225f7b50ce8
Fixed
6ad1bf47fbe5750c4d5d8e41337665e193e2c521
Fixed
3091ab943dfc7b2578599b0fe203350286fab5bb
Fixed
3f795fb35c2d8a637efe76b4518216c9319b998c
Fixed
3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c
Fixed
77ff34a56b695e228e6daf30ee30be747973d6e8
Fixed
0f6b3be28c4d62ef6498133959c72266629bea97
Fixed
edbd6bbe40ac524a8f2273ffacc53edf14f3c686
Fixed
c99626092efca3061b387043d4a7399bf75fbdd5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52868.json"