« List of all CVEs

CVE-2022-49581

be2net: Fix buffer overflow in be_get_module_eeprom

Published: 2/26/2025 Last updated: 5/4/2025 Reserved: 2/26/2025

In the Linux kernel, the following vulnerability has been resolved: be2net: Fix buffer overflow in be_get_module_eeprom be_cmd_read_port_transceiver_data assumes that it is given a buffer that is at least PAGE_DATA_LEN long, or twice that if the module supports SFF 8472. However, this is not always the case. Fix this by passing the desired offset and length to be_cmd_read_port_transceiver_data so that we only copy the bytes once.

CNA assigner: Linux (416baaa9-dc9f-4396-8d5f-8c081fb06d67) Requested by: n/a

Opam packages affected (10)

conf-bpftool conf-libbpf conf-linux-libc-dev hvsock mirage-block-unix solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm

Products affected (2)

Product Vendor Version
Linux Linux 8.0.21 and prior
Linux Linux n/a

References (8)