CVE-2024-43852

Source
https://cve.org/CVERecord?id=CVE-2024-43852
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43852.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-43852
Downstream
Published
2024-08-17T09:22:09.844Z
Modified
2026-05-15T11:53:23.461281595Z
Summary
hwmon: (ltc2991) re-order conditions to fix off by one bug
Details

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (ltc2991) re-order conditions to fix off by one bug

LTC2991TINTCHNR is 4. The st->tempen[] array has LTC2991MAXCHANNEL (4) elements. Thus if "channel" is equal to LTC2991TINTCH_NR then we have read one element beyond the end of the array. Flip the conditions around so that we check if "channel" is valid before using it as an array index.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43852.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43852.json"