In the Linux kernel, the following vulnerability has been resolved:
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
Coverity complains of a possible buffer overflow. However, given the 'static' scope of nvidiasetupi2c_bus() it looks like that can't happen after examiniing the call sites.
CID 19036 (#1 of 1): Copy into fixed size buffer (STRINGOVERFLOW) 1. fixedsizedest: You might overrun the 48-character fixed-size string chan->adapter.name by copying name without checking the length. 2. parameteras_source: Note: This defect has an elevated risk because the source argument is a parameter of the current function. 89 strcpy(chan->adapter.name, name);
Fix this warning by using strscpy() which will silence the warning and prevent any future buffer overflows should the names used to identify the channel become much longer.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47642.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.311"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.276"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.238"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.189"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.110"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.15.33"
}
]
},
{
"events": [
{
"introduced": "5.16"
},
{
"fixed": "5.16.19"
}
]
},
{
"events": [
{
"introduced": "5.17"
},
{
"fixed": "5.17.2"
}
]
}
]