CVE-2023-53830
Description
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: think-lmi: Fix memory leak when showing current settings
When retriving a item string with tlmi_setting(), the result has to be freed using kfree(). In current_value_show() however, malformed item strings are not freed, causing a memory leak. Fix this by eliminating the early return responsible for this.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's think-lmi driver, a memory leak occurs when malformed item strings are not freed in current_value_show(), fixed by removing an early return.
Vulnerability
Overview
In the Linux kernel's think-lmi driver (platform/x86), a memory leak vulnerability exists in the current_value_show() function. When retrieving an item string via tlmi_setting(), the result must be freed using kfree(). However, if the item string is malformed, the function returns early without freeing the allocated memory, leading to a memory leak [1].
Exploitation
This vulnerability
This vulnerability is triggered when a user or process reads the current_value sysfs attribute for a think-lmi setting that returns a malformed string. No special privileges are required beyond the ability to read the sysfs file, which is typically accessible to unprivileged users on systems with the think-lmi driver loaded. The attack surface is local, as it requires access to the sysfs interface.
Impact
An attacker with local access can repeatedly trigger the memory leak by reading the malformed setting, potentially exhausting system memory over time. This could lead to denial of service (DoS) conditions, such as system instability or crashes due to memory exhaustion.
Mitigation
The fix was applied in the Linux kernel stable tree via commit b9396d991abe [1]. Users should update to a kernel packages to include this patch. No workaround is available other than applying the patch or unloading the think-lmi module if not needed.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
4b9396d991abe9071525bfcb15f99014c19faa3c4c0530145Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.