In the Linux kernel, the following vulnerability has been resolved:
ovl: Use "buf" flexible array for memcpy() destination
The "buf" flexible array needs to be the memcpy() destination to avoid
false positive run-time warning from the recent FORTIFY_SOURCE
hardening:
memcpy: detected field-spanning write (size 93) of single field "&fh->fb"
at fs/overlayfs/export.c:799 (size 21)
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-03-27 17:15
Updated : 2026-01-19 13:16
NVD link : CVE-2022-49743
Mitre link : CVE-2022-49743
CVE.ORG link : CVE-2022-49743
JSON object : View
Products Affected
linux
- linux_kernel
CWE
