In the Linux kernel, the following vulnerability has been resolved:
be2net: Fix buffer overflow in begetmodule_eeprom
becmdreadporttransceiverdata assumes that it is given a buffer that is at least PAGEDATA_LEN long, or twice that if the module supports SFF 8472. However, this is not always the case.
Fix this by passing the desired offset and length to becmdreadporttransceiver_data so that we only copy the bytes once.