CVE-2022-50717 — Improper Validation of Specified Index, Position, or Offset in Input in Linux
Severity
6.1MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
nvmet-tcp: add bounds check on Transfer Tag
ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(),
add a bounds check to avoid out-of-bounds access.
Affected Packages4 packages
▶CVEListV5linux/linux872d26a391da92ed8f0c0f5cb5fef428067b7f30 — 0d150ccd55dbfad36f55855b40b381884c98456e+6
🔴Vulnerability Details
3OSV▶
CVE-2022-50717: In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds check on Transfer Tag ttag is used as an index to get cmd in↗2025-12-24
GHSA▶
GHSA-87xx-4gg4-q2mp: In the Linux kernel, the following vulnerability has been resolved:
nvmet-tcp: add bounds check on Transfer Tag
ttag is used as an index to get cmd↗2025-12-24