VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53807

CVE-2023-53807

Description

In the Linux kernel, the following vulnerability has been resolved:

clk: clocking-wizard: Fix Oops in clk_wzrd_register_divider()

Smatch detected this potential error pointer dereference clk_wzrd_register_divider(). If devm_clk_hw_register() fails then it sets "hw" to an error pointer and then dereferences it on the next line. Return the error directly instead.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null-pointer dereference in the Linux kernel's clocking-wizard driver can crash the system.

Root

Cause

The vulnerability is a dereference of an error pointer in the clk_wzrd_register_divider() function of the Linux kernel's clocking-wizard driver. Smatch static analysis identified that if devm_clk_hw_register() fails, the returned pointer hw is an error pointer, but the code immediately dereferences it without checking for an error, leading to an Oops (kernel crash) [1][2].

Exploitation

An attacker would need to be able to trigger a failure of devm_clk_hw_register(). This could be achieved by exhausting memory or causing a transient hardware failure in a system that uses the clocking-wizard driver. No special privileges are explicitly required; the vulnerability can be triggered during normal driver probe on affected hardware.

Impact

Successful exploitation leads to a kernel panic (denial of service) due to dereferencing an invalid pointer. The system crashes, requiring a reboot. There is no indication of privilege escalation or data corruption beyond the crash itself [1][2].

Mitigation

The fix has been applied to the mainline Linux kernel and stable branches. It simply returns the error pointer directly instead of dereferencing it. Users should update to a kernel version containing this commit (e.g., commit f078a65ebf93 or 25dbdfb7b71e) [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.