We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49743

ovl: Use "buf" flexible array for memcpy() destination



Description

In the Linux kernel, the following vulnerability has been resolved: ovl: Use "buf" flexible array for memcpy() destination The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIFY_SOURCE hardening: memcpy: detected field-spanning write (size 93) of single field "&fh->fb" at fs/overlayfs/export.c:799 (size 21)

Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before a77141a06367825d639ac51b04703d551163e36c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 07a96977b2f462337a9121302de64277b8747ab1
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before cf8aa9bf97cadf85745506c6a3e244b22c268d63
affected

Default status
affected

5.15.93
unaffected

6.1.11
unaffected

6.2
unaffected

References

git.kernel.org/...c/a77141a06367825d639ac51b04703d551163e36c

git.kernel.org/...c/07a96977b2f462337a9121302de64277b8747ab1

git.kernel.org/...c/cf8aa9bf97cadf85745506c6a3e244b22c268d63

cve.org (CVE-2022-49743)

nvd.nist.gov (CVE-2022-49743)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49743

Support options

Helpdesk Chat, Email, Knowledgebase