CVE-2022-49285

Source
https://cve.org/CVERecord?id=CVE-2022-49285
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49285.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49285
Downstream
Related
Published
2025-02-26T01:56:25.096Z
Modified
2026-03-12T03:24:56.574540Z
Summary
iio: accel: mma8452: use the correct logic to get mma8452_data
Details

In the Linux kernel, the following vulnerability has been resolved:

iio: accel: mma8452: use the correct logic to get mma8452_data

The original logic to get mma8452data is wrong, the *dev point to the device belong to iiodev. we can't use this dev to find the correct i2cclient. The original logic happen to work because it finally use dev->driverdata to get iiodev. Here use the API toi2c_client() is wrong and make reader confuse. To correct the logic, it should be like this

struct mma8452data *data = iiopriv(devgetdrvdata(dev));

But after commit 8b7651f25962 ("iio: iiodevicealloc(): Remove unnecessary self drvdata"), the upper logic also can't work. When try to show the avialable scale in userspace, will meet kernel dump, kernel handle NULL pointer dereference.

So use devtoiio_dev() to correct the logic.

Dual fixes tags as the second reflects when the bug was exposed, whilst the first reflects when the original bug was introduced.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49285.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c3cdd6e48e35b7a02f28e301ef30a87ff3cd6527
Fixed
4c0bb583a4444cce224e8661090cbffc98e2fe07
Fixed
d2d9ebdbff79d87d27652578e6d1638ad3b5f3bf
Fixed
c87b7b12f48db86ac9909894f4dc0107d7df6375

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49285.json"