VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50717

CVE-2022-50717

Description

In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: add bounds check on Transfer Tag

ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(), add a bounds check to avoid out-of-bounds access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's NVMe/TCP target (nvmet-tcp), an unbounded Transfer Tag (ttag) allows out-of-bounds access during H2C data PDU handling.

Vulnerability

Analysis

The Linux kernel's NVMe over TCP target (nvmet-tcp) is vulnerable to an out-of-bounds memory access due to a missing bounds check on the Transfer Tag (ttag) field. The nvmet_tcp_handle_h2c_data_pdu() function uses ttag as an index to retrieve a command structure from an array, but no validation ensures that the index stays within the allocated array bounds [1][2][3].

Attack

Vector

An attacker with network access to a system running the vulnerable nvmet-tcp target can craft a malicious NVMe/TCP H2C (Host-to-Controller) Data PDU with a crafted ttag value. The attack is performed remotely over the TCP connection and does not require authentication, as the nvmet-tcp target accepts PDUs from any client on the network.

Impact

Successfully exploiting this vulnerability allows the attacker to trigger an out-of-bounds read or write in kernel memory. This can lead to information disclosure (leaking sensitive kernel data) or a system crash (denial of service). In some configurations, it may be possible to escalate privileges or achieve remote code execution.

Remediation

The fix adds a bounds check to ensure ttag is within the valid range before using it as an array index. The patch has been applied to the Linux kernel stable branches and is available in the referenced commits [1][2][3]. Users should update their kernel to the latest stable release containing the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.