{"id":"CVE-2023-53702","summary":"s390/crypto: use vector instructions only if available for ChaCha20","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/crypto: use vector instructions only if available for ChaCha20\n\nCommit 349d03ffd5f6 (\"crypto: s390 - add crypto library interface for\nChaCha20\") added a library interface to the s390 specific ChaCha20\nimplementation. However no check was added to verify if the required\nfacilities are installed before branching into the assembler code.\n\nIf compiled into the kernel, this will lead to the following crash,\nif vector instructions are not available:\n\ndata exception: 0007 ilc:3 [#1] SMP\nModules linked in:\nCPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.3.0-rc7+ #11\nHardware name: IBM 3931 A01 704 (KVM/Linux)\nKrnl PSW : 0704e00180000000 000000001857277a (chacha20_vx+0x32/0x818)\n           R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\nKrnl GPRS: 0000037f0000000a ffffffffffffff60 000000008184b000 0000000019f5c8e6\n           0000000000000109 0000037fffb13c58 0000037fffb13c78 0000000019bb1780\n           0000037fffb13c58 0000000019f5c8e6 000000008184b000 0000000000000109\n           00000000802d8000 0000000000000109 0000000018571ebc 0000037fffb13718\nKrnl Code: 000000001857276a: c07000b1f80b        larl    %r7,0000000019bb1780\n           0000000018572770: a708000a            lhi     %r0,10\n          #0000000018572774: e78950000c36        vlm     %v24,%v25,0(%r5),0\n          \u003e000000001857277a: e7a060000806        vl      %v26,0(%r6),0\n           0000000018572780: e7bf70004c36        vlm     %v27,%v31,0(%r7),4\n           0000000018572786: e70b00000456        vlr     %v0,%v27\n           000000001857278c: e71800000456        vlr     %v1,%v24\n           0000000018572792: e74b00000456        vlr     %v4,%v27\nCall Trace:\n [\u003c000000001857277a\u003e] chacha20_vx+0x32/0x818\nLast Breaking-Event-Address:\n [\u003c0000000018571eb6\u003e] chacha20_crypt_s390.constprop.0+0x6e/0xd8\n---[ end trace 0000000000000000 ]---\nKernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b\n\nFix this by adding a missing MACHINE_HAS_VX check.\n\n[agordeev@linux.ibm.com: remove duplicates in commit message]","modified":"2026-04-02T09:44:56.057364Z","published":"2025-10-22T13:23:40.798Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53702.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/25e8d30507aa2f251152df1af7809e85b5538f4a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8703dd6b238da0ec6c276e53836f8200983d3d9b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/debb7797bba0caffdbdadc3e7968bb2c414f50da"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53702.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53702"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"349d03ffd5f62c298fd667ffa397c3fdc5c6194b"},{"fixed":"25e8d30507aa2f251152df1af7809e85b5538f4a"},{"fixed":"debb7797bba0caffdbdadc3e7968bb2c414f50da"},{"fixed":"8703dd6b238da0ec6c276e53836f8200983d3d9b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53702.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.19.0"},{"fixed":"6.1.30"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.3.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53702.json"}}],"schema_version":"1.7.5"}