{
  "threat_severity" : "Low",
  "public_date" : "2025-10-04T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: s390/zcrypt: don't leak memory if dev_set_name() fails",
    "id" : "2401507",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2401507"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-772",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\ns390/zcrypt: don't leak memory if dev_set_name() fails\nWhen dev_set_name() fails, zcdn_create() doesn't free the newly\nallocated resources. Do it.", "A resource leak was found in the Linux kernel's s390 cryptographic device driver in the device creation path. When the dev_set_name function fails during creation of a zcrypt device node, the zcdn_create function returns an error without freeing the newly allocated device structure and associated resources. This creates a permanent memory leak, leading to resource exhaustion and denial of service." ],
  "statement" : "The z/Architecture cryptographic device interface allows creation of additional device nodes for accessing crypto hardware. The zcdn_create function allocates a device structure and attempts to assign it a name using dev_set_name. If this naming operation fails—perhaps due to name collisions, memory allocation failures, or invalid characters—the function immediately returns an error code. At this point, the device structure has been allocated but never registered with the device core, so there's no automatic cleanup mechanism in place. The allocated memory, along with any other resources acquired during partial initialization, becomes orphaned. While dev_set_name failures are presumably rare in practice, any failure creates a leak that persists until system reboot. This is specific to s390 architecture systems with cryptographic hardware.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-05-13T00:00:00Z",
    "advisory" : "RHSA-2025:6966",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-570.12.1.el9_6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-05-13T00:00:00Z",
    "advisory" : "RHSA-2025:6966",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-570.12.1.el9_6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-53568\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53568\nhttps://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53568-0020@gregkh/T" ],
  "name" : "CVE-2023-53568",
  "csaw" : false
}