CVE-2022-21546
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's SCSI target subsystem allows attackers to crash the kernel by sending specially crafted WRITE SAME commands with the NDOB (No Data Out Buffer) bit set. This affects systems using SCSI target functionality, particularly those with iSCSI or other SCSI target configurations. The vulnerability can lead to denial of service.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to complete system crash and denial of service, potentially requiring physical intervention to restart.
Likely Case
System crash requiring reboot, causing service disruption and potential data loss for in-flight operations.
If Mitigated
No impact if SCSI target functionality is disabled or systems are properly patched.
🎯 Exploit Status
Exploit requires access to send SCSI commands to the target system. The sg_write_same command with --ndob flag can trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 4226622647e3e5ac06d3ebc1605b917446157510, 54e57be2573cf0b8bf650375fd8752987b6c3d3b, ccd3f449052449a917a3e577d8ba0368f43b8f29, d8e6a27e9238dd294d6f2f401655f300dca20899
Vendor Advisory: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
Restart Required: Yes
Instructions:
1. Update kernel package using distribution's package manager. 2. For Debian/Ubuntu: apt update && apt upgrade linux-image-*. 3. For RHEL/CentOS: yum update kernel. 4. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable SCSI target functionality
linuxIf SCSI target services are not required, disable them to eliminate the attack surface
systemctl stop target.service
systemctl disable target.service
Block SCSI WRITE SAME commands
linuxUse firewall rules or SCSI command filtering to block WRITE SAME commands
iptables -A INPUT -p tcp --dport 3260 -m string --string "WRITE_SAME" --algo bm -j DROP
🧯 If You Can't Patch
- Disable SCSI target services completely if not required
- Implement strict network access controls to limit who can send SCSI commands to vulnerable systems
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if SCSI target services are running: systemctl status target.service
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and test with sg_write_same --ndob command (should not crash)
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- SCSI command errors related to WRITE_SAME
Network Indicators:
- SCSI WRITE_SAME commands with NDOB bit set on iSCSI port 3260
SIEM Query:
source="kernel" AND "panic" AND ("WRITE_SAME" OR "SCSI")
🔗 References
- https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510
- https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b
- https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29
- https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html