CVE-2022-49581

Updated: 2025-11-19 04:41:16.081578

Description:

In the Linux kernel, the following vulnerability has been resolved: be2net: Fix buffer overflow in be_get_module_eeprom be_cmd_read_port_transceiver_data assumes that it is given a buffer that is at least PAGE_DATA_LEN long, or twice that if the module supports SFF 8472. However, this is not always the case. Fix this by passing the desired offset and length to be_cmd_read_port_transceiver_data so that we only copy the bytes once.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2026:1771078945 2026-02-14 21:08:40
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2026:1771077729 2026-02-14 21:08:41
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Needs Triage 2025-11-19 08:51:45
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Needs Triage 2025-11-19 09:12:17