In the Linux kernel, the following vulnerability has been resolved:
ovl: Use "buf" flexible array for memcpy() destination
The "buf" flexible array needs to be the memcpy() destination to avoid
false positive run-time warning from the recent FORTIFY_SOURCE
hardening:
  memcpy: detected field-spanning write (size 93) of single field "&fh->fb"
  at fs/overlayfs/export.c:799 (size 21)
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    30 Oct 2025, 15:27
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Linux linux Kernel Linux | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.5 | 
| References | () https://git.kernel.org/stable/c/07a96977b2f462337a9121302de64277b8747ab1 - Patch | |
| References | () https://git.kernel.org/stable/c/a77141a06367825d639ac51b04703d551163e36c - Patch | |
| References | () https://git.kernel.org/stable/c/cf8aa9bf97cadf85745506c6a3e244b22c268d63 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| Summary | 
 | 
27 Mar 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-27 17:15
Updated : 2025-10-30 15:27
NVD link : CVE-2022-49743
Mitre link : CVE-2022-49743
CVE.ORG link : CVE-2022-49743
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                