In the Linux kernel, the following vulnerability has been resolved:
perf/x86/amd/core: Always clear status for idx
The variable 'status' (which contains the unhandled overflow bits) is
not being properly masked in some cases, displaying the following
warning:
WARNING: CPU: 156 PID: 475601 at arch/x86/events/amd/core.c:972 amd_pmu_v2_handle_irq+0x216/0x270
This seems to be happening because the loop is being continued before
the status bit being unset, in case x86_perf_event_set_period()
returns 0. This is also causing an inconsistency because the "handled"
counter is incremented, but the status bit is not cleaned.
Move the bit cleaning together above, together when the "handled"
counter is incremented.
References
Configurations
Configuration 1 (hide)
|
History
12 Nov 2025, 20:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/263f5ecaf7080513efc248ec739b6d9e00f4129f - Patch | |
| References | () https://git.kernel.org/stable/c/9d4c7b1f12e101d6d6253092588b127416ddfb6c - Patch | |
| References | () https://git.kernel.org/stable/c/ab33a8f7649b0324639a336e1081aaea51a4523e - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-Other | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
05 May 2025, 20:54
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-02 16:15
Updated : 2025-11-12 20:50
NVD link : CVE-2023-53073
Mitre link : CVE-2023-53073
CVE.ORG link : CVE-2023-53073
JSON object : View
Products Affected
linux
- linux_kernel
CWE
