CVE-2022-49581

Source
https://cve.org/CVERecord?id=CVE-2022-49581
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49581.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49581
Downstream
Related
Published
2025-02-26T02:23:19.148Z
Modified
2026-03-20T12:24:39.753808Z
Summary
be2net: Fix buffer overflow in be_get_module_eeprom
Details

In the Linux kernel, the following vulnerability has been resolved:

be2net: Fix buffer overflow in begetmodule_eeprom

becmdreadporttransceiverdata assumes that it is given a buffer that is at least PAGEDATA_LEN long, or twice that if the module supports SFF 8472. However, this is not always the case.

Fix this by passing the desired offset and length to becmdreadporttransceiver_data so that we only copy the bytes once.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49581.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e36edd9d26cf257511548edaf2b7a56eb4fed854
Fixed
a5a8fc0679a8fd58d47aa2ebcfc5742631f753f9
Fixed
fe4473fc7940f14c4a12db873b9729134c212654
Fixed
8ff4f9df73e5c551a72ee6034886c17e8de6596d
Fixed
a8569f76df7ec5b4b51155c57523a0b356db5741
Fixed
665cbe91de2f7c97c51ca8fce39aae26477c1948
Fixed
aba8ff847f4f927ad7a1a1ee4a9f29989a1a728f
Fixed
18043da94c023f3ef09c15017bdb04e8f695ef10
Fixed
d7241f679a59cfe27f92cb5c6272cb429fb1f7ec

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49581.json"