CVE-2022-50717
Description
In the Linux kernel, the following vulnerability has been resolved:
nvmet-tcp: add bounds check on Transfer Tag
ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(), add a bounds check to avoid out-of-bounds access.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's NVMe/TCP target (nvmet-tcp), an unbounded Transfer Tag (ttag) allows out-of-bounds access during H2C data PDU handling.
Vulnerability
Analysis
The Linux kernel's NVMe over TCP target (nvmet-tcp) is vulnerable to an out-of-bounds memory access due to a missing bounds check on the Transfer Tag (ttag) field. The nvmet_tcp_handle_h2c_data_pdu() function uses ttag as an index to retrieve a command structure from an array, but no validation ensures that the index stays within the allocated array bounds [1][2][3].
Attack
Vector
An attacker with network access to a system running the vulnerable nvmet-tcp target can craft a malicious NVMe/TCP H2C (Host-to-Controller) Data PDU with a crafted ttag value. The attack is performed remotely over the TCP connection and does not require authentication, as the nvmet-tcp target accepts PDUs from any client on the network.
Impact
Successfully exploiting this vulnerability allows the attacker to trigger an out-of-bounds read or write in kernel memory. This can lead to information disclosure (leaking sensitive kernel data) or a system crash (denial of service). In some configurations, it may be possible to escalate privileges or achieve remote code execution.
Remediation
The fix adds a bounds check to ensure ttag is within the valid range before using it as an array index. The patch has been applied to the Linux kernel stable branches and is available in the referenced commits [1][2][3]. Users should update their kernel to the latest stable release containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
60d150ccd55dbd5bb45f47b37ec8adf767e1cfcf82e4553db752593d04637b6a545ffa2c1Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/0d150ccd55dbfad36f55855b40b381884c98456envd
- git.kernel.org/stable/c/752593d04637ebdc87fd29cba81897f21ae053f0nvd
- git.kernel.org/stable/c/b6a545ffa2c192b1e6da4a7924edac5ba9f4ea2bnvd
- git.kernel.org/stable/c/d5bb45f47b37d10f010355686b28c9ebacb361d4nvd
- git.kernel.org/stable/c/ec8adf767e1cfa7031f853b8c71ba1963f07df15nvd
- git.kernel.org/stable/c/fcf82e4553db911d10234ff2390cfd0e2aa854e4nvd
News mentions
0No linked articles in our index yet.