CVE-2023-53702 — Unchecked Return Value in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 93.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 22
Description
In the Linux kernel, the following vulnerability has been resolved:
s390/crypto: use vector instructions only if available for ChaCha20
Commit 349d03ffd5f6 ("crypto: s390 - add crypto library interface for
ChaCha20") added a library interface to the s390 specific ChaCha20
implementation. However no check was added to verify if the required
facilities are installed before branching into the assembler code.
If compiled into the kernel, this will lead to the following crash,
if vector instructio…
Affected Packages4 packages
▶CVEListV5linux/linux349d03ffd5f62c298fd667ffa397c3fdc5c6194b — 25e8d30507aa2f251152df1af7809e85b5538f4a+3
🔴Vulnerability Details
3OSV▶
CVE-2023-53702: In the Linux kernel, the following vulnerability has been resolved: s390/crypto: use vector instructions only if available for ChaCha20 Commit 349d03f↗2025-10-22
GHSA▶
GHSA-28rv-6x7m-q268: In the Linux kernel, the following vulnerability has been resolved:
s390/crypto: use vector instructions only if available for ChaCha20
Commit 349d0↗2025-10-22