
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-43852 affects the Linux kernel's hardware monitoring (hwmon) subsystem, specifically in the LTC2991 driver. The vulnerability was discovered in July 2024 and involves an off-by-one error in array access. The issue affects Linux kernel versions from 6.7 up to (excluding) 6.10.3 (NVD).
The vulnerability stems from an array bounds issue in the LTC2991 driver where LTC2991TINTCHNR is 4 and the st->tempen[] array has LTC2991MAXCHANNEL (4) elements. When the 'channel' variable equals LTC2991TINTCH_NR, the code reads one element beyond the end of the array. The fix involves reordering conditions to validate the channel value before using it as an array index (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 base score of 7.8 HIGH with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability could potentially lead to unauthorized access to memory beyond the array bounds, which could result in information disclosure, system crashes, or potential privilege escalation in the Linux kernel (NVD).
The issue has been fixed in the Linux kernel through a patch that reorders the condition checks. Ubuntu has released updates for affected versions, including Ubuntu 24.04 LTS (noble) and Ubuntu 22.04 LTS (jammy). Users are advised to update their systems to the patched versions (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."