CVE-2022-49267

Source
https://cve.org/CVERecord?id=CVE-2022-49267
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49267.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49267
Downstream
Published
2025-02-26T01:56:16.211Z
Modified
2026-03-20T12:22:18.467762Z
Summary
mmc: core: use sysfs_emit() instead of sprintf()
Details

In the Linux kernel, the following vulnerability has been resolved:

mmc: core: use sysfs_emit() instead of sprintf()

sprintf() (still used in the MMC core for the sysfs output) is vulnerable to the buffer overflow. Use the new-fangled sysfs_emit() instead.

Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49267.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
0f55ac683b2722714016f16daae9cab3f7f7b9f9
Fixed
659ca56b5415c7a1d05e185c36fad80ba165d063
Fixed
c4ab65738ab3e21fe519ee46b2051222bc8e32ef
Fixed
f5d8a5fe77ce933f53eb8f2e22bb7a1a2019ea11

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49267.json"