{"id":"CVE-2021-47642","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow\n\nCoverity complains of a possible buffer overflow. However,\ngiven the 'static' scope of nvidia_setup_i2c_bus() it looks\nlike that can't happen after examiniing the call sites.\n\nCID 19036 (#1 of 1): Copy into fixed size buffer (STRING_OVERFLOW)\n1. fixed_size_dest: You might overrun the 48-character fixed-size string\n  chan-\u003eadapter.name by copying name without checking the length.\n2. parameter_as_source: Note: This defect has an elevated risk because the\n  source argument is a parameter of the current function.\n 89        strcpy(chan-\u003eadapter.name, name);\n\nFix this warning by using strscpy() which will silence the warning and\nprevent any future buffer overflows should the names used to identify the\nchannel become much longer.","modified":"2026-03-15T22:43:16.814965Z","published":"2025-02-26T06:37:05.993Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/055cdd2e7b992921424d4daaa285ced787fb205f"},{"type":"FIX","url":"https://git.kernel.org/stable/c/08dff482012758935c185532b1ad7d584785a86e"},{"type":"FIX","url":"https://git.kernel.org/stable/c/47e5533adf118afaf06d25a3e2aaaab89371b1c5"},{"type":"FIX","url":"https://git.kernel.org/stable/c/6a5226e544ac043bb2d8dc1bfe8920d02282f7cd"},{"type":"FIX","url":"https://git.kernel.org/stable/c/9ff2f7294ab0f011cd4d1b7dcd9a07d8fdf72834"},{"type":"FIX","url":"https://git.kernel.org/stable/c/37a1a2e6eeeb101285cd34e12e48a881524701aa"},{"type":"FIX","url":"https://git.kernel.org/stable/c/41baa86b6c802cdc6ab8ff2d46c083c9be93de81"},{"type":"FIX","url":"https://git.kernel.org/stable/c/580e5d3815474b8349250c25c16416585a72c7fe"},{"type":"FIX","url":"https://git.kernel.org/stable/c/72dd5c46a152136712a55bf026a9aa8c1b12b60d"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.311"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.276"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.238"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.189"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.110"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.33"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.16.19"}]},{"events":[{"introduced":"5.17"},{"fixed":"5.17.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47642.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}