{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T18:20:48.563","vulnerabilities":[{"cve":{"id":"CVE-2023-54252","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-30T13:16:13.883","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings\n\nMy previous commit introduced a memory leak where the item allocated\nfrom tlmi_setting was not freed.\nThis commit also renames it to avoid confusion with the similarly name\nvariable in the same function."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nplatform/x86: think-lmi: Corrige fugas de memoria al analizar cadenas WMI de ThinkStation\n\nMi commit anterior introdujo una fuga de memoria donde el elemento asignado de tlmi_setting no fue liberado.\nEste commit también lo renombra para evitar confusiones con la variable de nombre similar en la misma función."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/081da7b1c881828244b93b3befb7c18389f696bb","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/43fc0342bac1808fda2b76184e43414727111c6b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/cccdb30935c82be805d3362a15680b95d5cb3ee0","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/e7d796fccdc8d17c2d21817ebe4c7bf5bbfe5433","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}