{"id":"CVE-2023-52868","summary":"thermal: core: prevent potential string overflow","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: core: prevent potential string overflow\n\nThe dev-\u003eid value comes from ida_alloc() so it's a number between zero\nand INT_MAX.  If it's too high then these sprintf()s will overflow.","modified":"2026-03-20T12:32:50.988040Z","published":"2024-05-21T15:31:58.530Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52868.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521"},{"type":"WEB","url":"https://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52868.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52868"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"203d3d4aa482339b4816f131f713e1b8ee37f6dd"},{"fixed":"b55f0a9f865be75ca1019aad331f3225f7b50ce8"},{"fixed":"6ad1bf47fbe5750c4d5d8e41337665e193e2c521"},{"fixed":"3091ab943dfc7b2578599b0fe203350286fab5bb"},{"fixed":"3f795fb35c2d8a637efe76b4518216c9319b998c"},{"fixed":"3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c"},{"fixed":"77ff34a56b695e228e6daf30ee30be747973d6e8"},{"fixed":"0f6b3be28c4d62ef6498133959c72266629bea97"},{"fixed":"edbd6bbe40ac524a8f2273ffacc53edf14f3c686"},{"fixed":"c99626092efca3061b387043d4a7399bf75fbdd5"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52868.json"}}],"schema_version":"1.7.5"}