In the Linux kernel, the following vulnerability has been resolved:
be2net: Fix buffer overflow in be_get_module_eeprom
be_cmd_read_port_transceiver_data assumes that it is given a buffer that
is at least PAGE_DATA_LEN long, or twice that if the module supports SFF
8472. However, this is not always the case.
Fix this by passing the desired offset and length to
be_cmd_read_port_transceiver_data so that we only copy the bytes once.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-02-26 07:01
Updated : 2025-10-22 19:10
NVD link : CVE-2022-49581
Mitre link : CVE-2022-49581
CVE.ORG link : CVE-2022-49581
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
