Home

Description

In the Linux kernel, the following vulnerability has been resolved: HID: hyperv: avoid struct memcpy overrun warning A previous patch addressed the fortified memcpy warning for most builds, but I still see this one with gcc-9: In file included from include/linux/string.h:254, from drivers/hid/hid-hyperv.c:8: In function 'fortify_memcpy_chk', inlined from 'mousevsc_on_receive' at drivers/hid/hid-hyperv.c:272:3: include/linux/fortify-string.h:583:4: error: call to '__write_overflow_field' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning] 583 | __write_overflow_field(p_size_field, size); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ My guess is that the WARN_ON() itself is what confuses gcc, so it no longer sees that there is a correct range check. Rework the code in a way that helps readability and avoids the warning.

PUBLISHED Reserved 2025-10-04 | Published 2025-10-04 | Updated 2025-10-04 | Assigner Linux

Product status

Default status
unaffected

542f25a94471570e2594be5b422b9ca572cf88a1 before a7902cc5f5b9c95997017c8e309da760fb1deb6e
affected

542f25a94471570e2594be5b422b9ca572cf88a1 before 5f151364b1da6bd217632fd4ee8cc24eaf66a497
affected

Default status
affected

6.2
affected

Any version before 6.2
unaffected

6.4.5
unaffected

6.5
unaffected

References

git.kernel.org/...c/a7902cc5f5b9c95997017c8e309da760fb1deb6e

git.kernel.org/...c/5f151364b1da6bd217632fd4ee8cc24eaf66a497

cve.org (CVE-2023-53553)

nvd.nist.gov (CVE-2023-53553)

Download JSON