In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Fix WRITE_SAME No Data Buffer crash
In newer version of the SBC specs, we have a NDOB bit that indicates there
is no data buffer that gets written out. If this bit is set using commands
like "sg_write_same --ndob" we will crash in target_core_iblock/file's
execute_write_same handlers when we go to access the se_cmd->t_data_sg
because its NULL.
This patch adds a check for the NDOB bit in the common WRITE SAME code
because we don't support it. And, it adds a check for zero SG elements in
each handler in case the initiator tries to send a normal WRITE SAME with
no data buffer.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
10 Nov 2025, 17:37
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510 - Patch | |
| References | () https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b - Patch | |
| References | () https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29 - Patch | |
| References | () https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Mailing List |
03 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Jun 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
| References |
|
|
09 May 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 May 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | (en) In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is set using commands like "sg_write_same --ndob" we will crash in target_core_iblock/file's execute_write_same handlers when we go to access the se_cmd->t_data_sg because its NULL. This patch adds a check for the NDOB bit in the common WRITE SAME code because we don't support it. And, it adds a check for zero SG elements in each handler in case the initiator tries to send a normal WRITE SAME with no data buffer. |
06 May 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-476 |
05 May 2025, 20:54
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 May 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-02 22:15
Updated : 2025-11-10 17:37
NVD link : CVE-2022-21546
Mitre link : CVE-2022-21546
CVE.ORG link : CVE-2022-21546
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
