{"uuid": "e72878d1-a515-4293-a230-c98af01b059e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43852", "type": "seen", "source": "https://t.me/cvedetector/3413", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43852 - LTC2991 hwmon Array Index Out of Bounds Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43852 \nPublished : Aug. 17, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nhwmon: (ltc2991) re-order conditions to fix off by one bug  \n  \nLTC2991_T_INT_CH_NR is 4.  The st-&gt;temp_en[] array has LTC2991_MAX_CHANNEL  \n(4) elements.  Thus if \"channel\" is equal to LTC2991_T_INT_CH_NR then we  \nhave read one element beyond the end of the array.  Flip the conditions  \naround so that we check if \"channel\" is valid before using it as an array  \nindex. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-17T13:09:02.000000Z"}