In the Linux kernel, the following vulnerability has been resolved:
be2net: Fix buffer overflow in be_get_module_eeprom
be_cmd_read_port_transceiver_data assumes that it is given a buffer that
is at least PAGE_DATA_LEN long, or twice that if the module supports SFF
8472. However, this is not always the case.
Fix this by passing the desired offset and length to
be_cmd_read_port_transceiver_data so that we only copy the bytes once.
Metrics
Affected Vendors & Products
References
History
Fri, 28 Feb 2025 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:45:00 +0000

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T02:23:19.148Z
Updated: 2025-05-04T08:41:06.565Z
Reserved: 2025-02-26T02:21:30.412Z
Link: CVE-2022-49581

No data.

Status : Received
Published: 2025-02-26T07:01:33.703
Modified: 2025-02-26T07:01:33.703
Link: CVE-2022-49581
