VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53830

CVE-2023-53830

Description

In the Linux kernel, the following vulnerability has been resolved:

platform/x86: think-lmi: Fix memory leak when showing current settings

When retriving a item string with tlmi_setting(), the result has to be freed using kfree(). In current_value_show() however, malformed item strings are not freed, causing a memory leak. Fix this by eliminating the early return responsible for this.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's think-lmi driver, a memory leak occurs when malformed item strings are not freed in current_value_show(), fixed by removing an early return.

Vulnerability

Overview

In the Linux kernel's think-lmi driver (platform/x86), a memory leak vulnerability exists in the current_value_show() function. When retrieving an item string via tlmi_setting(), the result must be freed using kfree(). However, if the item string is malformed, the function returns early without freeing the allocated memory, leading to a memory leak [1].

Exploitation

This vulnerability

This vulnerability is triggered when a user or process reads the current_value sysfs attribute for a think-lmi setting that returns a malformed string. No special privileges are required beyond the ability to read the sysfs file, which is typically accessible to unprivileged users on systems with the think-lmi driver loaded. The attack surface is local, as it requires access to the sysfs interface.

Impact

An attacker with local access can repeatedly trigger the memory leak by reading the malformed setting, potentially exhausting system memory over time. This could lead to denial of service (DoS) conditions, such as system instability or crashes due to memory exhaustion.

Mitigation

The fix was applied in the Linux kernel stable tree via commit b9396d991abe [1]. Users should update to a kernel packages to include this patch. No workaround is available other than applying the patch or unloading the think-lmi module if not needed.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.