๐Ÿ” CVE Alert

CVE-2023-53438

MEDIUM 5.5

x86/MCE: Always save CS register on AMD Zen IF Poison errors

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: x86/MCE: Always save CS register on AMD Zen IF Poison errors The Instruction Fetch (IF) units on current AMD Zen-based systems do not guarantee a synchronous #MC is delivered for poison consumption errors. Therefore, MCG_STATUS[EIPV|RIPV] will not be set. However, the microarchitecture does guarantee that the exception is delivered within the same context. In other words, the exact rIP is not known, but the context is known to not have changed. There is no architecturally-defined method to determine this behavior. The Code Segment (CS) register is always valid on such IF unit poison errors regardless of the value of MCG_STATUS[EIPV|RIPV]. Add a quirk to save the CS register for poison consumption from the IF unit banks. This is needed to properly determine the context of the error. Otherwise, the severity grading function will assume the context is IN_KERNEL due to the m->cs value being 0 (the initialized value). This leads to unnecessary kernel panics on data poison errors due to the kernel believing the poison consumption occurred in kernel context.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e6e6a5f50f58fadec397b23064b7e4830292863d 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6eac3965901489ae114a664a78cd2d1415d1af5c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2e01bdf7203c383e9d8489d9f963c52d6c81e4db 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 4240e2ebe67941ce2c4f5c866c3af4b5ac7a0c67
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e6e6a5f50f58fadec397b23064b7e4830292863d git.kernel.org: https://git.kernel.org/stable/c/6eac3965901489ae114a664a78cd2d1415d1af5c git.kernel.org: https://git.kernel.org/stable/c/2e01bdf7203c383e9d8489d9f963c52d6c81e4db git.kernel.org: https://git.kernel.org/stable/c/4240e2ebe67941ce2c4f5c866c3af4b5ac7a0c67