Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds check on Transfer Tag ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(), add a bounds check to avoid out-of-bounds access.
References
- https://git.kernel.org/stable/c/0d150ccd55dbfad36f55855b40b381884c98456e
- https://git.kernel.org/stable/c/752593d04637ebdc87fd29cba81897f21ae053f0
- https://git.kernel.org/stable/c/b6a545ffa2c192b1e6da4a7924edac5ba9f4ea2b
- https://git.kernel.org/stable/c/d5bb45f47b37d10f010355686b28c9ebacb361d4
- https://git.kernel.org/stable/c/ec8adf767e1cfa7031f853b8c71ba1963f07df15
- https://git.kernel.org/stable/c/fcf82e4553db911d10234ff2390cfd0e2aa854e4
FAQ
What is CVE-2022-50717?
CVE-2022-50717 is a documented vulnerability. In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds check on Transfer Tag ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(), add a bounds c...
How severe is CVE-2022-50717?
CVSS scoring is not yet available for CVE-2022-50717. Check NVD for updates.
Is there a patch for CVE-2022-50717?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.