CVE-2022-49743

medium

Description

In the Linux kernel, the following vulnerability has been resolved: ovl: Use "buf" flexible array for memcpy() destination The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIFY_SOURCE hardening: memcpy: detected field-spanning write (size 93) of single field "&fh->fb" at fs/overlayfs/export.c:799 (size 21)

References

https://git.kernel.org/stable/c/cf8aa9bf97cadf85745506c6a3e244b22c268d63

https://git.kernel.org/stable/c/a77141a06367825d639ac51b04703d551163e36c

https://git.kernel.org/stable/c/07a96977b2f462337a9121302de64277b8747ab1

Details

Source: Mitre, NVD

Published: 2025-03-27

Updated: 2025-03-28

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00017