Impact
The Linux kernel driver for the hx9023s proximity sensor contains a division‑by‑zero bug in the set_samp_freq function. If an unspecified sampling frequency is passed, the calculation causes a division by zero that triggers a kernel panic, leading to an immediate system reboot or stall and effectively denying service to the affected host. This weakness is classified as CWE‑369 and does not provide a privilege escalation or data exfiltration vector.
Affected Systems
All Linux kernel releases that include the hx9023s driver before the patch. No exact version range is listed, so any system running a kernel that has not incorporated the commit that fixes the bug is potentially vulnerable. The driver is part of the core kernel source and is distributed with most mainstream Linux distributions.
Risk and Exploitability
The vulnerability exists in kernel code that is exercised through the hx9023s device interface, meaning an attacker would need to interact with the driver to trigger the faulty path. This interaction is likely local or requires privileged access, and the EPSS score is not available, so the probability of exploitation is uncertain. The vulnerability is not listed in the CISA KEV catalog, and no public exploit is known, but a kernel crash would result in a full denial of service to the impacted system.
OpenCVE Enrichment