CVE-2024-57912

7.1 HIGH

📋 TL;DR

This CVE-2024-57912 is an information leak vulnerability in the Linux kernel's zpa2326 pressure sensor driver. When triggered buffer data is sent to userspace, uninitialized memory from a struct hole between temperature and timestamp fields can be exposed. This affects Linux systems using the zpa2326 IIO pressure driver.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected kernel versions not specified in CVE; check git commits for exact ranges
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with zpa2326 pressure sensor hardware and the corresponding IIO driver enabled.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure could reveal sensitive information like encryption keys, passwords, or other process data from kernel memory, potentially enabling further attacks.

🟠

Likely Case

Limited information leak exposing random kernel memory contents, which could be used for information gathering or combined with other vulnerabilities.

🟢

If Mitigated

No information disclosure; only properly initialized sensor data is exposed to userspace.

🌐 Internet-Facing: LOW - This requires local access to the affected system and specific hardware/driver usage.
🏢 Internal Only: MEDIUM - Local users or processes could exploit this to gather kernel memory information on systems with zpa2326 hardware.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to interact with the zpa2326 IIO device interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fix commits

Vendor Advisory: https://git.kernel.org/stable/c/6007d10c5262f6f71479627c1216899ea7f09073

Restart Required: No

Instructions:

1. Update Linux kernel to patched version. 2. For custom kernels, apply the fix commits from git.kernel.org. 3. Recompile and install the updated kernel.

🔧 Temporary Workarounds

Disable zpa2326 driver

Linux

Remove or disable the vulnerable driver module if zpa2326 hardware is not needed

modprobe -r zpa2326
echo 'blacklist zpa2326' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Restrict access to IIO device files (e.g., /sys/bus/iio/devices/) to trusted users only
  • Monitor for unusual access patterns to pressure sensor device interfaces

🔍 How to Verify

Check if Vulnerable:

Check if zpa2326 module is loaded: lsmod | grep zpa2326 AND check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or test that struct initialization occurs in driver code

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to IIO device files
  • Multiple reads from pressure sensor interfaces

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Process accessing /sys/bus/iio/devices/iio:device*/in_pressure* files from untrusted users

🔗 References

📤 Share & Export