CVE-2022-49743

In the Linux kernel, the following vulnerability has been resolved: ovl: Use "buf" flexible array for memcpy() destination The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIFY_SOURCE hardening: memcpy: detected field-spanning write (size 93) of single field "&fh->fb" at fs/overlayfs/export.c:799 (size 21)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

30 Oct 2025, 15:27

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/07a96977b2f462337a9121302de64277b8747ab1 - () https://git.kernel.org/stable/c/07a96977b2f462337a9121302de64277b8747ab1 - Patch
References () https://git.kernel.org/stable/c/a77141a06367825d639ac51b04703d551163e36c - () https://git.kernel.org/stable/c/a77141a06367825d639ac51b04703d551163e36c - Patch
References () https://git.kernel.org/stable/c/cf8aa9bf97cadf85745506c6a3e244b22c268d63 - () https://git.kernel.org/stable/c/cf8aa9bf97cadf85745506c6a3e244b22c268d63 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ovl: Usar la matriz flexible "buf" para el destino de memcpy() La matriz flexible "buf" debe ser el destino de memcpy() para evitar una advertencia de tiempo de ejecución de falsos positivos del reciente endurecimiento de FORTIFY_SOURCE: memcpy: se detectó una escritura que abarca el campo (tamaño 93) de un solo campo "&fh->fb" en fs/overlayfs/export.c:799 (tamaño 21)

27 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 17:15

Updated : 2025-10-30 15:27


NVD link : CVE-2022-49743

Mitre link : CVE-2022-49743

CVE.ORG link : CVE-2022-49743


JSON object : View

Products Affected

linux

  • linux_kernel