{"id":"CVE-2022-21546","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix WRITE_SAME No Data Buffer crash\n\nIn newer version of the SBC specs, we have a NDOB bit that indicates there\nis no data buffer that gets written out. If this bit is set using commands\nlike \"sg_write_same --ndob\" we will crash in target_core_iblock/file's\nexecute_write_same handlers when we go to access the se_cmd-\u003et_data_sg\nbecause its NULL.\n\nThis patch adds a check for the NDOB bit in the common WRITE SAME code\nbecause we don't support it. And, it adds a check for zero SG elements in\neach handler in case the initiator tries to send a normal WRITE SAME with\nno data buffer.","modified":"2026-03-11T13:50:10.896920Z","published":"2025-05-02T22:15:15.290Z","related":["SUSE-SU-2025:02334-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510"},{"type":"FIX","url":"https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b"},{"type":"FIX","url":"https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29"},{"type":"FIX","url":"https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.4.294"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.238"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.182"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.19"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.19-rc6"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-21546.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}