In the Linux kernel, the following vulnerability has been resolved:
ovl: Use "buf" flexible array for memcpy() destination
The "buf" flexible array needs to be the memcpy() destination to avoid
false positive run-time warning from the recent FORTIFY_SOURCE
hardening:
memcpy: detected field-spanning write (size 93) of single field "&fh->fb"
at fs/overlayfs/export.c:799 (size 21)
References
Configurations
Configuration 1 (hide)
|
History
19 Jan 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
30 Oct 2025, 15:27
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/07a96977b2f462337a9121302de64277b8747ab1 - Patch | |
| References | () https://git.kernel.org/stable/c/a77141a06367825d639ac51b04703d551163e36c - Patch | |
| References | () https://git.kernel.org/stable/c/cf8aa9bf97cadf85745506c6a3e244b22c268d63 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| Summary |
|
27 Mar 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-27 17:15
Updated : 2026-01-19 13:16
NVD link : CVE-2022-49743
Mitre link : CVE-2022-49743
CVE.ORG link : CVE-2022-49743
JSON object : View
Products Affected
linux
- linux_kernel
CWE
