{"id":"CVE-2023-54252","summary":"platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings\n\nMy previous commit introduced a memory leak where the item allocated\nfrom tlmi_setting was not freed.\nThis commit also renames it to avoid confusion with the similarly name\nvariable in the same function.","modified":"2026-03-20T12:33:31.647890Z","published":"2025-12-30T12:15:48.796Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54252.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/081da7b1c881828244b93b3befb7c18389f696bb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/43fc0342bac1808fda2b76184e43414727111c6b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cccdb30935c82be805d3362a15680b95d5cb3ee0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e7d796fccdc8d17c2d21817ebe4c7bf5bbfe5433"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54252.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54252"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"dae47bf0222e1e0eb6684c7e141b7170b0884a4c"},{"fixed":"cccdb30935c82be805d3362a15680b95d5cb3ee0"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f0a67ad7dce49d93570edc795e0312bb787f19bb"},{"fixed":"081da7b1c881828244b93b3befb7c18389f696bb"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c9c542eba4edf8d061bd2e5007cf598625e112df"},{"fixed":"43fc0342bac1808fda2b76184e43414727111c6b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8a02d70679fc1c434401863333c8ea7dbf201494"},{"fixed":"e7d796fccdc8d17c2d21817ebe4c7bf5bbfe5433"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54252.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.15.106"},{"fixed":"5.15.107"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.23"},{"fixed":"6.1.24"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.10"},{"fixed":"6.2.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54252.json"}}],"schema_version":"1.7.5"}