In the Linux kernel, the following vulnerability has been resolved: ovl: Use "buf" flexible array for memcpy() destination The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIFY_SOURCE hardening: memcpy: detected field-spanning write (size 93) of single field "&fh->fb" at fs/overlayfs/export.c:799 (size 21)
https://git.kernel.org/stable/c/cf8aa9bf97cadf85745506c6a3e244b22c268d63
https://git.kernel.org/stable/c/a77141a06367825d639ac51b04703d551163e36c
https://git.kernel.org/stable/c/07a96977b2f462337a9121302de64277b8747ab1