{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T19:41:18.995","vulnerabilities":[{"cve":{"id":"CVE-2023-54320","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-30T13:16:21.307","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2()\n\nFunction amd_pmc_stb_debugfs_open_v2() may be called when the STB\ndebug mechanism enabled.\n\nWhen amd_pmc_send_cmd() fails, the 'buf' needs to be released."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nplatform/x86/amd: pmc: Corrección de fuga de memoria en amd_pmc_stb_debugfs_open_v2()\n\nLa función amd_pmc_stb_debugfs_open_v2() puede ser llamada cuando el mecanismo de depuración STB está habilitado.\n\nCuando amd_pmc_send_cmd() falla, el buf necesita ser liberado."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/d804adef7b23b22bb82e1b3dd113e9073cea9bc1","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f6e7ac4c35a28aef0be93b32c533ae678ad0b9e7","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}