CVE-2023-53438Improper Handling of Exceptional Conditions in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: x86/MCE: Always save CS register on AMD Zen IF Poison errors The Instruction Fetch (IF) units on current AMD Zen-based systems do not guarantee a synchronous #MC is delivered for poison consumption errors. Therefore, MCG_STATUS[EIPV|RIPV] will not be set. However, the microarchitecture does guarantee that the exception is delivered within the same context. In other words, the exact rIP is not known, but the context is known to

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53438: In the Linux kernel, the following vulnerability has been resolved: x86/MCE: Always save CS register on AMD Zen IF Poison errors The Instruction Fetch2025-09-18
GHSA
GHSA-wqhj-q653-q9c9: In the Linux kernel, the following vulnerability has been resolved: x86/MCE: Always save CS register on AMD Zen IF Poison errors The Instruction Fet2025-09-18

📋Vendor Advisories

3
Red Hat
kernel: x86/MCE: Always save CS register on AMD Zen IF Poison errors2025-09-18
Microsoft
x86/MCE: Always save CS register on AMD Zen IF Poison errors2025-09-09
Debian
CVE-2023-53438: linux - In the Linux kernel, the following vulnerability has been resolved: x86/MCE: Al...2023
CVE-2023-53438 — Linux vulnerability | cvebase