CVE-2022-49581
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: be2net: Fix buffer overflow in be_get_module_eeprom be_cmd_read_port_transceiver_data assumes that it is given a buffer that is at least PAGE_DATA_LEN long, or twice that if the module supports SFF 8472. However, this is not always the case. Fix this by passing the desired offset and length to be_cmd_read_port_transceiver_data so that we only copy the bytes once.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 3.18 ≤ 𝑥 < 4.9.325 |
| linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.290 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.254 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.208 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.134 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.58 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.18.15 |
| linux | linux_kernel | 5.19:rc1 |
| linux | linux_kernel | 5.19:rc2 |
| linux | linux_kernel | 5.19:rc3 |
| linux | linux_kernel | 5.19:rc4 |
| linux | linux_kernel | 5.19:rc5 |
| linux | linux_kernel | 5.19:rc6 |
| linux | linux_kernel | 5.19:rc7 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References