CVE-2023-53438
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 6.1.53 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.16 (exc) |
| linux | linux_kernel | From 6.5 (inc) to 6.5.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel on AMD Zen-based systems where the Instruction Fetch (IF) units do not guarantee a synchronous Machine Check (#MC) for poison consumption errors. As a result, certain status bits (MCG_STATUS[EIPV|RIPV]) are not set, making it difficult to determine the exact instruction pointer at the time of the error. The kernel incorrectly assumes the error occurred in kernel context because the Code Segment (CS) register was not saved properly and defaults to zero. This causes unnecessary kernel panics. The fix adds a quirk to always save the CS register on these errors to correctly identify the error context and avoid false kernel panics.
How can this vulnerability impact me? :
This vulnerability can cause unnecessary kernel panics on AMD Zen-based systems when data poison errors occur. The kernel mistakenly believes the error happened in kernel context due to missing CS register information, leading to system crashes and instability. This can result in unexpected downtime and potential data loss or disruption of services running on affected systems.