
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49267 affects the Linux kernel's MMC (MultiMediaCard) core component. The vulnerability was discovered by Linux Verification Center (linuxtesting.org) using the SVACE static analysis tool. The issue involves the use of sprintf() in the MMC core for sysfs output, which is vulnerable to buffer overflow (NVD).
The vulnerability exists in the MMC core's sysfs output functionality where sprintf() is used without proper buffer size checking. This unsafe string handling could lead to buffer overflow conditions. The fix involves replacing all instances of sprintf() with the safer sysfs_emit() function, which provides proper bounds checking (Kernel Commit).
A successful exploitation of this vulnerability could allow an attacker to cause a buffer overflow in the MMC core component. This could potentially lead to memory corruption and system crashes, though the exact impact depends on the specific exploitation conditions (Ubuntu).
The vulnerability has been fixed by replacing sprintf() with sysfs_emit() in the MMC core component. Users should update their Linux kernel to a version that includes the fix. The patch has been backported to various stable kernel versions (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."