{"id":"CVE-2022-49743","summary":"ovl: Use \"buf\" flexible array for memcpy() destination","details":"In the Linux kernel, the following vulnerability has been resolved:\n\novl: Use \"buf\" flexible array for memcpy() destination\n\nThe \"buf\" flexible array needs to be the memcpy() destination to avoid\nfalse positive run-time warning from the recent FORTIFY_SOURCE\nhardening:\n\n  memcpy: detected field-spanning write (size 93) of single field \"&fh-\u003efb\"\n  at fs/overlayfs/export.c:799 (size 21)","modified":"2026-03-20T11:47:11.488621Z","published":"2025-03-27T16:42:54.289Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49743.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/012cdef22000f3104e4fa8224ad29fde509b8caf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/07a96977b2f462337a9121302de64277b8747ab1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a77141a06367825d639ac51b04703d551163e36c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cf8aa9bf97cadf85745506c6a3e244b22c268d63"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49743.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49743"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"cbe7fba8edfc8cb8e621599e376f8ac5c224fa72"},{"fixed":"012cdef22000f3104e4fa8224ad29fde509b8caf"},{"fixed":"a77141a06367825d639ac51b04703d551163e36c"},{"fixed":"07a96977b2f462337a9121302de64277b8747ab1"},{"fixed":"cf8aa9bf97cadf85745506c6a3e244b22c268d63"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49743.json"}}],"schema_version":"1.7.5"}