CVE-2023-53438
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/09/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86/MCE: Always save CS register on AMD Zen IF Poison errors<br />
<br />
The Instruction Fetch (IF) units on current AMD Zen-based systems do not<br />
guarantee a synchronous #MC is delivered for poison consumption errors.<br />
Therefore, MCG_STATUS[EIPV|RIPV] will not be set. However, the<br />
microarchitecture does guarantee that the exception is delivered within<br />
the same context. In other words, the exact rIP is not known, but the<br />
context is known to not have changed.<br />
<br />
There is no architecturally-defined method to determine this behavior.<br />
<br />
The Code Segment (CS) register is always valid on such IF unit poison<br />
errors regardless of the value of MCG_STATUS[EIPV|RIPV].<br />
<br />
Add a quirk to save the CS register for poison consumption from the IF<br />
unit banks.<br />
<br />
This is needed to properly determine the context of the error.<br />
Otherwise, the severity grading function will assume the context is<br />
IN_KERNEL due to the m->cs value being 0 (the initialized value). This<br />
leads to unnecessary kernel panics on data poison errors due to the<br />
kernel believing the poison consumption occurred in kernel context.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.53 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.4.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5 (including) | 6.5.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



