{"id":"CVE-2023-53521","summary":"scsi: ses: Fix slab-out-of-bounds in ses_intf_remove()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Fix slab-out-of-bounds in ses_intf_remove()\n\nA fix for:\n\nBUG: KASAN: slab-out-of-bounds in ses_intf_remove+0x23f/0x270 [ses]\nRead of size 8 at addr ffff88a10d32e5d8 by task rmmod/12013\n\nWhen edev-\u003ecomponents is zero, accessing edev-\u003ecomponent[0] members is\nwrong.","modified":"2026-04-11T12:46:48.670060Z","published":"2025-10-01T11:46:08.131Z","related":["SUSE-SU-2025:03614-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3761-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53521.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0595cdb587726b4f0fa780eb7462e3679d141e82"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2fb1fa8425cce2dc4dce298275d22d7077694b73"},{"type":"WEB","url":"https://git.kernel.org/stable/c/40af9a6deed723485e05b7d3255a28750692e8db"},{"type":"WEB","url":"https://git.kernel.org/stable/c/578797f0c8cbc2e3ec5fc0dab87087b4c7073686"},{"type":"WEB","url":"https://git.kernel.org/stable/c/76f7050537476ac062ec23a544fbca8270f2d08b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/82143faf01dda831b89eccef60c39ef8575ab08a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/87e47be38d205df338c52ead43f23b2864567423"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8f9542cad6c27297c8391de3a659f0b7948495d0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53521.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53521"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9927c68864e9c39cc317b4f559309ba29e642168"},{"fixed":"76f7050537476ac062ec23a544fbca8270f2d08b"},{"fixed":"87e47be38d205df338c52ead43f23b2864567423"},{"fixed":"40af9a6deed723485e05b7d3255a28750692e8db"},{"fixed":"8f9542cad6c27297c8391de3a659f0b7948495d0"},{"fixed":"0595cdb587726b4f0fa780eb7462e3679d141e82"},{"fixed":"82143faf01dda831b89eccef60c39ef8575ab08a"},{"fixed":"2fb1fa8425cce2dc4dce298275d22d7077694b73"},{"fixed":"578797f0c8cbc2e3ec5fc0dab87087b4c7073686"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53521.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.25"},{"fixed":"4.14.308"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.276"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.235"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.173"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.99"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53521.json"}}],"schema_version":"1.7.5"}