Impact
The vulnerability resides in the st_lsm6dsx driver part of the Linux kernel. When userspace writes a buffer sampling frequency to a sysfs attribute, the driver calls a function that accesses an array using the sensor’s identifier. Because the array contains only two entries, using a sensor type other than the accelerometer or gyroscope causes an out‑of‑bounds read. This can expose internal kernel memory contents and may lead to a denial‑of‑service if the read corrupts control data. The flaw does not directly allow arbitrary code execution but can compromise confidentiality or cause instability.
Affected Systems
The flaw affects Linux kernel installations that include the st_lsm6dsx driver. All vendors using the stock Linux kernel with this driver, regardless of distribution, are potentially impacted. No specific kernel version is listed, so the problem likely exists in any kernel built with the existing driver code.
Risk and Exploitability
The CVSS and EPSS metrics are not reported, and the vulnerability is not listed in CISA’s KEV catalog, implying no publicly known exploitation yet. The required write to the sysfs attribute typically requires elevated privileges, so the attack vector is local privilege escalation or a user with root access. Although the blast radius is limited to the kernel process, the out‑of‑bounds read could compromise sensitive data or cause a crash, making the risk moderate if the kernel is not patched.
OpenCVE Enrichment