{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T01:58:29.265","vulnerabilities":[{"cve":{"id":"CVE-2023-54301","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-30T13:16:19.223","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_bcm7271: fix leak in `brcmuart_probe`\n\nSmatch reports:\ndrivers/tty/serial/8250/8250_bcm7271.c:1120 brcmuart_probe() warn:\n'baud_mux_clk' from clk_prepare_enable() not released on lines: 1032.\n\nThe issue is fixed by using a managed clock."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nserial: 8250_bcm7271: corrige una fuga en 'brcmuart_probe'\n\nSmatch informa:\ndrivers/tty/serial/8250/8250_bcm7271.c:1120 brcmuart_probe() advertencia:\n'baud_mux_clk' de clk_prepare_enable() no liberado en las líneas: 1032.\n\nEl problema se corrige mediante el uso de un reloj gestionado."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/2a3e5f428fc4315be6144524912eaefac16f43a9","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/5258395e67fee6929fb8e50c8239f8de51b8cb2d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/56a81445b8e4b8906d557518c5dae3ddbb447d1e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f264f2f6f4788dc031cef60a0cf2881902736709","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}