AMD Zen Systems Vulnerability in Linux Kernel
CVE-2023-53438

5.5MEDIUM

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
18 September 2025

What is CVE-2023-53438?

A vulnerability has been identified in the Linux kernel pertaining to AMD Zen-based systems. The Instruction Fetch (IF) units in these systems do not reliably ensure that synchronous machine check (#MC) exceptions are reported for errors related to poison consumption. This shortfall, due to an incomplete status update (MCG_STATUS) for error contexts, can inadvertently lead the kernel to assume that errors occurred in kernel space, which might trigger unnecessary kernel panics. A patch has been implemented to address this by ensuring that the Code Segment (CS) register is saved whenever a poison consumption error arises from the IF unit, thus improving diagnostic clarity without compromising system stability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6eac3965901489ae114a664a78cd2d1415d1af5c

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2e01bdf7203c383e9d8489d9f963c52d6c81e4db

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.