CVE-2023-53073

medium

Description

In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd/core: Always clear status for idx The variable 'status' (which contains the unhandled overflow bits) is not being properly masked in some cases, displaying the following warning: WARNING: CPU: 156 PID: 475601 at arch/x86/events/amd/core.c:972 amd_pmu_v2_handle_irq+0x216/0x270 This seems to be happening because the loop is being continued before the status bit being unset, in case x86_perf_event_set_period() returns 0. This is also causing an inconsistency because the "handled" counter is incremented, but the status bit is not cleaned. Move the bit cleaning together above, together when the "handled" counter is incremented.

References

https://git.kernel.org/stable/c/ab33a8f7649b0324639a336e1081aaea51a4523e

https://git.kernel.org/stable/c/9d4c7b1f12e101d6d6253092588b127416ddfb6c

https://git.kernel.org/stable/c/263f5ecaf7080513efc248ec739b6d9e00f4129f

Details

Source: Mitre, NVD

Published: 2025-05-02

Updated: 2025-05-02

Risk Information

CVSS v2

Base Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00017