We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-21546

scsi: target: Fix WRITE_SAME No Data Buffer crash



Description

In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is set using commands like "sg_write_same --ndob" we will crash in target_core_iblock/file's execute_write_same handlers when we go to access the se_cmd->t_data_sg because its NULL. This patch adds a check for the NDOB bit in the common WRITE SAME code because we don't support it. And, it adds a check for zero SG elements in each handler in case the initiator tries to send a normal WRITE SAME with no data buffer.

Reserved 2021-11-15 | Published 2025-05-02 | Updated 2025-05-09 | Assigner oracle

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 4226622647e3e5ac06d3ebc1605b917446157510
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ccd3f449052449a917a3e577d8ba0368f43b8f29
affected

Default status
affected

5.15.182
unaffected

5.19
unaffected

References

git.kernel.org/...c/4226622647e3e5ac06d3ebc1605b917446157510

git.kernel.org/...c/ccd3f449052449a917a3e577d8ba0368f43b8f29

cve.org (CVE-2022-21546)

nvd.nist.gov (CVE-2022-21546)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-21546

Support options

Helpdesk Chat, Email, Knowledgebase