In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is set using commands like "sg_write_same --ndob" we will crash in target_core_iblock/file's execute_write_same handlers when we go to access the se_cmd->t_data_sg because its NULL. This patch adds a check for the NDOB bit in the common WRITE SAME code because we don't support it. And, it adds a check for zero SG elements in each handler in case the initiator tries to send a normal WRITE SAME with no data buffer.
2025-05-02T22:15:15.290
2025-11-10T17:37:14.470
Analyzed
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 7.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 5.4.294 | Yes |
| Operating System | linux | linux_kernel | < 5.10.238 | Yes |
| Operating System | linux | linux_kernel | < 5.15.182 | Yes |
| Operating System | linux | linux_kernel | < 5.19 | Yes |
| Operating System | linux | linux_kernel | 5.19 | Yes |
| Operating System | linux | linux_kernel | 5.19 | Yes |
| Operating System | linux | linux_kernel | 5.19 | Yes |
| Operating System | linux | linux_kernel | 5.19 | Yes |
| Operating System | linux | linux_kernel | 5.19 | Yes |
| Operating System | linux | linux_kernel | 5.19 | Yes |
| Operating System | debian | debian_linux | 11.0 | Yes |