๐Ÿ” CVE Alert

CVE-2022-50215

UNKNOWN 0.0

scsi: sg: Allow waiting for commands to complete on removed device

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Allow waiting for commands to complete on removed device When a SCSI device is removed while in active use, currently sg will immediately return -ENODEV on any attempt to wait for active commands that were sent before the removal. This is problematic for commands that use SG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel when userspace frees or reuses it after getting ENODEV, leading to corrupted userspace memory (in the case of READ-type commands) or corrupted data being sent to the device (in the case of WRITE-type commands). This has been seen in practice when logging out of a iscsi_tcp session, where the iSCSI driver may still be processing commands after the device has been marked for removal. Change the policy to allow userspace to wait for active sg commands even when the device is being removed. Return -ENODEV only when there are no more responses to read.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
c6517b7942fad663cc1cf3235cbe4207cf769332 < bbc118acf7baf9e93c5e1314d14f481301af4d0f c6517b7942fad663cc1cf3235cbe4207cf769332 < f5e61d9b4a699dd16f32d5f39eb1cf98d84c92ed c6517b7942fad663cc1cf3235cbe4207cf769332 < ed9afd967cbfe7da2dc0d5e52c62a778dfe9f16b c6517b7942fad663cc1cf3235cbe4207cf769332 < f135c65085eed869d10e4e7923ce1015288618da c6517b7942fad663cc1cf3235cbe4207cf769332 < 408bfa1489a3cfe7150b81ab0b0df99b23dd5411 c6517b7942fad663cc1cf3235cbe4207cf769332 < 8c004b7dbb340c1e5889f5fb9e5baa6f6e5303e8 c6517b7942fad663cc1cf3235cbe4207cf769332 < 35e60ec39e862159cb92923eefd5230d4a873cb9 c6517b7942fad663cc1cf3235cbe4207cf769332 < 03d8241112d5e3cccce1a01274a221099f07d2e1 c6517b7942fad663cc1cf3235cbe4207cf769332 < 3455607fd7be10b449f5135c00dc306b85dc0d21 a0fe972f78eaaf352d593f9ed9079de590ceb286 b21c6d2897cd455fa396f4041a0c8165784e949f
Linux / Linux
2.6.30

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/bbc118acf7baf9e93c5e1314d14f481301af4d0f git.kernel.org: https://git.kernel.org/stable/c/f5e61d9b4a699dd16f32d5f39eb1cf98d84c92ed git.kernel.org: https://git.kernel.org/stable/c/ed9afd967cbfe7da2dc0d5e52c62a778dfe9f16b git.kernel.org: https://git.kernel.org/stable/c/f135c65085eed869d10e4e7923ce1015288618da git.kernel.org: https://git.kernel.org/stable/c/408bfa1489a3cfe7150b81ab0b0df99b23dd5411 git.kernel.org: https://git.kernel.org/stable/c/8c004b7dbb340c1e5889f5fb9e5baa6f6e5303e8 git.kernel.org: https://git.kernel.org/stable/c/35e60ec39e862159cb92923eefd5230d4a873cb9 git.kernel.org: https://git.kernel.org/stable/c/03d8241112d5e3cccce1a01274a221099f07d2e1 git.kernel.org: https://git.kernel.org/stable/c/3455607fd7be10b449f5135c00dc306b85dc0d21