Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: iio: accel: mma8452: use the correct logic to get mma8452_data The original logic to get mma8452_data is wrong, the *dev point to the device belong to iio_dev. we can't use this dev to find the correct i2c_client. The original logic happen to work because it finally use dev->driver_data to get iio_dev. Here use the API to_i2c_client() is wrong and make reader confuse. To correct the logic, it should be like this struct mma8452_data *data = iio_priv(dev_get_drvdata(dev)); But after commit 8b7651f25962 ("iio: iio_device_alloc(): Remove unnecessary self drvdata"), the upper logic also can't work. When try to show the avialable scale in userspace, will meet kernel dump, kernel handle NULL pointer dereference. So use dev_to_iio_dev() to correct the logic. Dual fixes tags as the second reflects when the bug was exposed, whilst the first reflects when the original bug was introduced.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.4, < 5.15.54 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/4c0bb583a4444cce224e8661090cbffc98e2fe07Patch
- https://git.kernel.org/stable/c/c87b7b12f48db86ac9909894f4dc0107d7df6375Patch
- https://git.kernel.org/stable/c/d2d9ebdbff79d87d27652578e6d1638ad3b5f3bfPatch
FAQ
What is CVE-2022-49285?
CVE-2022-49285 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: iio: accel: mma8452: use the correct logic to get mma8452_data The original logic to get mma8452_data is wrong, the *dev point to ...
How severe is CVE-2022-49285?
CVE-2022-49285 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49285?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.