In the Linux kernel, the following vulnerability has been resolved:
ovl: Use "buf" flexible array for memcpy() destination
The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIFY_SOURCE hardening:
memcpy: detected field-spanning write (size 93) of single field "&fh->fb" at fs/overlayfs/export.c:799 (size 21)
[
{
"signature_type": "Function",
"digest": {
"function_hash": "79608505349122443821942184930157448347",
"length": 432.0
},
"target": {
"file": "fs/overlayfs/export.c",
"function": "ovl_fid_to_fh"
},
"signature_version": "v1",
"id": "CVE-2022-49743-0e946bbb",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf8aa9bf97cadf85745506c6a3e244b22c268d63"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"294094764775854921027864965152995393430",
"117205696930418158758976273903680695764",
"208455678804915213546636490253252635454",
"126284899817506339666105189422701146277"
]
},
"target": {
"file": "fs/overlayfs/overlayfs.h"
},
"signature_version": "v1",
"id": "CVE-2022-49743-11988e77",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf8aa9bf97cadf85745506c6a3e244b22c268d63"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "79608505349122443821942184930157448347",
"length": 432.0
},
"target": {
"file": "fs/overlayfs/export.c",
"function": "ovl_fid_to_fh"
},
"signature_version": "v1",
"id": "CVE-2022-49743-15393122",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a77141a06367825d639ac51b04703d551163e36c"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"294094764775854921027864965152995393430",
"117205696930418158758976273903680695764",
"208455678804915213546636490253252635454",
"126284899817506339666105189422701146277"
]
},
"target": {
"file": "fs/overlayfs/overlayfs.h"
},
"signature_version": "v1",
"id": "CVE-2022-49743-1ab17eff",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@07a96977b2f462337a9121302de64277b8747ab1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"101158417377155212636285904319996631981",
"99033021786630385426916494182097803584",
"113861157617349632095247279336906033109",
"12298126955163813264207184222269238095"
]
},
"target": {
"file": "fs/overlayfs/export.c"
},
"signature_version": "v1",
"id": "CVE-2022-49743-68e54df3",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a77141a06367825d639ac51b04703d551163e36c"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"101158417377155212636285904319996631981",
"99033021786630385426916494182097803584",
"113861157617349632095247279336906033109",
"12298126955163813264207184222269238095"
]
},
"target": {
"file": "fs/overlayfs/export.c"
},
"signature_version": "v1",
"id": "CVE-2022-49743-7d31940c",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@07a96977b2f462337a9121302de64277b8747ab1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "79608505349122443821942184930157448347",
"length": 432.0
},
"target": {
"file": "fs/overlayfs/export.c",
"function": "ovl_fid_to_fh"
},
"signature_version": "v1",
"id": "CVE-2022-49743-9b7386e2",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@07a96977b2f462337a9121302de64277b8747ab1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"101158417377155212636285904319996631981",
"99033021786630385426916494182097803584",
"113861157617349632095247279336906033109",
"12298126955163813264207184222269238095"
]
},
"target": {
"file": "fs/overlayfs/export.c"
},
"signature_version": "v1",
"id": "CVE-2022-49743-da402c95",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf8aa9bf97cadf85745506c6a3e244b22c268d63"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"294094764775854921027864965152995393430",
"117205696930418158758976273903680695764",
"208455678804915213546636490253252635454",
"126284899817506339666105189422701146277"
]
},
"target": {
"file": "fs/overlayfs/overlayfs.h"
},
"signature_version": "v1",
"id": "CVE-2022-49743-dc367f5f",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a77141a06367825d639ac51b04703d551163e36c"
}
]