In the Linux kernel, the following vulnerability has been resolved:
be2net: Fix buffer overflow in begetmodule_eeprom
becmdreadporttransceiverdata assumes that it is given a buffer that is at least PAGEDATA_LEN long, or twice that if the module supports SFF 8472. However, this is not always the case.
Fix this by passing the desired offset and length to becmdreadporttransceiver_data so that we only copy the bytes once.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49581.json"
}