CVE-2023-7324
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses
Sanitize possible addl_desc_ptr out-of-bounds accesses in ses_enclosure_data_process().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing bounds check in the Linux kernel's SCSI enclosure (SES) driver can lead to out-of-bounds reads when processing enclosure diagnostics data.
Vulnerability
Overview
CVE-2023-7324 is a vulnerability in the Linux kernel's SCSI Enclosure Services (SES) driver. The flaw resides in the ses_enclosure_data_process() function, where the addl_desc_ptr (additional descriptor pointer) is not properly sanitized before use. This can result in out-of-bounds reads when processing specially crafted enclosure diagnostic data [1][2].
Exploitation
An attacker with the ability to deliver a malicious SCSI enclosure diagnostic page (e.g., via a compromised or malicious SCSI enclosure device) could trigger the out-of-bounds access. No special privileges beyond-normal privileges are required beyond the ability to submit SCSI commands to the affected device. The attack surface is limited to systems that have SCSI enclosures attached and where the SES driver is loaded [3][4].
Impact
Successful exploitation could lead to information disclosure (reading kernel memory beyond the intended buffer) or a system crash (denial of service). The vulnerability does not appear to allow arbitrary code execution based on the available information [1][2].
Mitigation
The issue has been fixed in the Linux kernel with commits that add proper bounds checking for the addl_desc_ptr [1][2][3][4]. Users should apply the stable kernel branches should apply the corresponding patches. No workaround is available other than updating the kernel.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8af5114d824f3a156a262c5438e454aba72802ecd344173a5384aa697d8f227067c672980b91ef85a32fddb95d4df71cbVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/27067c672980b497cc34048b69b12820851ac6b9nvd
- git.kernel.org/stable/c/2ecd344173a5663d523433819da0484cb268b186nvd
- git.kernel.org/stable/c/384aa697d8f2a28b5e962f5292cdfd2e528b5df7nvd
- git.kernel.org/stable/c/8e454aba72805241239caf8ba9b8e5a6be772b96nvd
- git.kernel.org/stable/c/a156a262c543fa5ff30bcb2fc6ad1a95cb4ab57anvd
- git.kernel.org/stable/c/af5114d824f3511a69d68beff49ca9a7c32d44e0nvd
- git.kernel.org/stable/c/b91ef85a32fdba45fcbad87dd526d73d3b6d857dnvd
- git.kernel.org/stable/c/db95d4df71cb55506425b6e4a5f8d68e3a765b63nvd
News mentions
0No linked articles in our index yet.