This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-54959 In the Linux kernel, the following vulnerability has been resolved: mmc: core: use sysfs_emit() instead of sprintf() sprintf() (still used in the MMC core for the sysfs output) is vulnerable to the buffer overflow. Use the new-fangled sysfs_emit() instead. Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.
Ubuntu USN Ubuntu USN USN-8060-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8060-2 Linux kernel (Real-time) vulnerabilities
Ubuntu USN Ubuntu USN USN-8060-3 Linux kernel (GCP FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8060-4 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8060-5 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8060-6 Linux kernel (AWS FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8070-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8070-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8070-3 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8060-7 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-8098-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8098-2 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-8098-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8107-1 Linux kernel (AWS FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8112-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8112-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8098-4 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8112-3 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-8112-4 Linux kernel (Azure FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8112-5 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-8098-5 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8098-6 Linux kernel (FIPS) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 24 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Tue, 24 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mmc: core: use sysfs_emit() instead of sprintf() sprintf() (still used in the MMC core for the sysfs output) is vulnerable to the buffer overflow. Use the new-fangled sysfs_emit() instead. Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool. This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Title mmc: core: use sysfs_emit() instead of sprintf() kernel: mmc: core: use sysfs_emit() instead of sprintf()

Mon, 19 Jan 2026 12:45:00 +0000


Tue, 21 Oct 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Weaknesses CWE-120
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 25 Apr 2025 03:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux

Wed, 23 Apr 2025 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Thu, 27 Feb 2025 01:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 26 Feb 2025 02:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mmc: core: use sysfs_emit() instead of sprintf() sprintf() (still used in the MMC core for the sysfs output) is vulnerable to the buffer overflow. Use the new-fangled sysfs_emit() instead. Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.
Title mmc: core: use sysfs_emit() instead of sprintf()
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: REJECTED

Assigner: Linux

Published:

Updated: 2026-03-24T08:34:49.555Z

Reserved: 2025-02-26T01:49:39.297Z

Link: CVE-2022-49267

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2025-02-26T07:01:03.620

Modified: 2026-03-24T09:16:18.790

Link: CVE-2022-49267

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-02-26T00:00:00Z

Links: CVE-2022-49267 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.