VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54005

CVE-2023-54005

Description

In the Linux kernel, the following vulnerability has been resolved:

binder: fix memory leak in binder_init()

In binder_init(), the destruction of binder_alloc_shrinker_init() is not performed in the wrong path, which will cause memory leaks. So this commit introduces binder_alloc_shrinker_exit() and calls it in the wrong path to fix that.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's binder driver during initialization can exhaust system memory; fixed by adding a proper cleanup on error path.

Vulnerability

In the Linux kernel's binder driver, the binder_init() function fails to properly clean up the binder_alloc_shrinker_init() allocation when an error occurs an error later in the initialization path. This missing deallocation causes a memory leak [1].

Exploitation

The vulnerability is triggered during system boot when the binder module is initialized. No special privileges or user interaction are required; the leak occurs automatically on any system that loads the binder driver (common in Android environments). An attacker with local access could potentially force repeated module loads to accelerate memory exhaustion.

Impact

Over time, the unreleased memory accumulates, leading to gradual system memory pressure and potential denial of service. The leak is limited to the initialization phase, but repeated module loading (if possible) could exacerbate the issue.

Mitigation

The fix introduces binder_alloc_shrinker_exit() and calls it on the error path in binder_init() [1]. Patches have been applied to stable kernel trees [2][3][4]. Users should update to a kernel containing the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.