-
CVE-2022-50717
- EPSS 0.04%
- Veröffentlicht 24.12.2025 12:22:41
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds check on Transfer Tag ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(), add a bounds check to avoid out-of-bounds access.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
0d150ccd55dbfad36f55855b40b381884c98456e
Version
872d26a391da92ed8f0c0f5cb5fef428067b7f30
Status
affected
Version <
d5bb45f47b37d10f010355686b28c9ebacb361d4
Version
872d26a391da92ed8f0c0f5cb5fef428067b7f30
Status
affected
Version <
ec8adf767e1cfa7031f853b8c71ba1963f07df15
Version
872d26a391da92ed8f0c0f5cb5fef428067b7f30
Status
affected
Version <
fcf82e4553db911d10234ff2390cfd0e2aa854e4
Version
872d26a391da92ed8f0c0f5cb5fef428067b7f30
Status
affected
Version <
752593d04637ebdc87fd29cba81897f21ae053f0
Version
872d26a391da92ed8f0c0f5cb5fef428067b7f30
Status
affected
Version <
b6a545ffa2c192b1e6da4a7924edac5ba9f4ea2b
Version
872d26a391da92ed8f0c0f5cb5fef428067b7f30
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.0
Status
affected
Version <
5.0
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.220
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|