
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-7324 is a vulnerability in the Linux kernel's SCSI enclosure services (SES) component, discovered and disclosed on October 29, 2025. The vulnerability affects the SES enclosure parser functionality, specifically in the sesenclosuredata_process() function (NVD).
The vulnerability involves potential out-of-bounds accesses in the addldescptr within the SES enclosure parser. The issue stems from missing length checks that could allow reading past the end of the additional descriptor buffer (page10). The vulnerability has been assigned a CVSS 3.1 base score of 5.5 with the vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (Red Hat).
The practical impact of this vulnerability is primarily a local Denial of Service (DoS) condition during SES page parsing. The vulnerability typically requires privileged access to SCSI enclosure controls to be exploited (Red Hat).
The fix involves passing maxdesclen into sesprocessdescriptor(), adding per-branch minimum-length guards, and nulling addldescptr on failure to prevent out-of-bounds reads. For Red Hat Enterprise Linux versions 7, 8, and 9, including their RT variants, the fix is currently deferred (Red Hat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."