CVE-2023-53702
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3.0-rc7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's s390 architecture-specific ChaCha20 cryptographic implementation. A commit added a library interface for ChaCha20 using vector instructions but failed to check if the hardware supports these vector instructions before executing the assembler code. If the kernel is compiled with this code on hardware lacking vector instruction support, it causes a kernel crash due to a data exception.
How can this vulnerability impact me? :
If your system runs the affected Linux kernel on s390 hardware without vector instruction support, this vulnerability can cause a kernel crash leading to a system panic and potential downtime or data loss.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version that includes the fix for this vulnerability, which adds a MACHINE_HAS_VX check before using vector instructions in the s390 ChaCha20 implementation. This prevents kernel crashes on systems without vector instruction support.