VYPR
Unrated severityNVD Advisory· Published Oct 29, 2025· Updated Apr 15, 2026

CVE-2023-7324

CVE-2023-7324

Description

In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses

Sanitize possible addl_desc_ptr out-of-bounds accesses in ses_enclosure_data_process().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing bounds check in the Linux kernel's SCSI enclosure (SES) driver can lead to out-of-bounds reads when processing enclosure diagnostics data.

Vulnerability

Overview

CVE-2023-7324 is a vulnerability in the Linux kernel's SCSI Enclosure Services (SES) driver. The flaw resides in the ses_enclosure_data_process() function, where the addl_desc_ptr (additional descriptor pointer) is not properly sanitized before use. This can result in out-of-bounds reads when processing specially crafted enclosure diagnostic data [1][2].

Exploitation

An attacker with the ability to deliver a malicious SCSI enclosure diagnostic page (e.g., via a compromised or malicious SCSI enclosure device) could trigger the out-of-bounds access. No special privileges beyond-normal privileges are required beyond the ability to submit SCSI commands to the affected device. The attack surface is limited to systems that have SCSI enclosures attached and where the SES driver is loaded [3][4].

Impact

Successful exploitation could lead to information disclosure (reading kernel memory beyond the intended buffer) or a system crash (denial of service). The vulnerability does not appear to allow arbitrary code execution based on the available information [1][2].

Mitigation

The issue has been fixed in the Linux kernel with commits that add proper bounds checking for the addl_desc_ptr [1][2][3][4]. Users should apply the stable kernel branches should apply the corresponding patches. No workaround is available other than updating the kernel.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.