In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds check on Transfer Tag ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(), add a bounds check to avoid out-of-bounds access.Referenceshttps://git.kernel.org/stable/c/0d150ccd55dbfad36f55855b40b381884c98456ehttps://git.kernel.org/stable/c/d5bb45f47b37d10f010355686b28c9ebacb361d4https://git.kernel.org/stable/c/ec8adf767e1cfa7031f853b8c71ba1963f07df15https://git.kernel.org/stable/c/fcf82e4553db911d10234ff2390cfd0e2aa854e4https://git.kernel.org/stable/c/752593d04637ebdc87fd29cba81897f21ae053f0https://git.kernel.org/stable/c/b6a545ffa2c192b1e6da4a7924edac5ba9f4ea2b