In the Linux kernel, the following vulnerability has been resolved:
ovl: Use "buf" flexible array for memcpy() destination
The "buf" flexible array needs to be the memcpy() destination to avoid
false positive run-time warning from the recent FORTIFY_SOURCE
hardening:
memcpy: detected field-spanning write (size 93) of single field "&fh->fb"
at fs/overlayfs/export.c:799 (size 21)
Metrics
Affected Vendors & Products
References
History
Wed, 02 Apr 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 27 Mar 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ovl: Use "buf" flexible array for memcpy() destination The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIFY_SOURCE hardening: memcpy: detected field-spanning write (size 93) of single field "&fh->fb" at fs/overlayfs/export.c:799 (size 21) | |
Title | ovl: Use "buf" flexible array for memcpy() destination | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-03-27T16:42:54.289Z
Updated: 2025-05-04T08:44:26.260Z
Reserved: 2025-03-27T16:39:17.987Z
Link: CVE-2022-49743

No data.

Status : Awaiting Analysis
Published: 2025-03-27T17:15:38.967
Modified: 2025-03-28T18:11:49.747
Link: CVE-2022-49743
