CVE-2023-54005
Description
In the Linux kernel, the following vulnerability has been resolved:
binder: fix memory leak in binder_init()
In binder_init(), the destruction of binder_alloc_shrinker_init() is not performed in the wrong path, which will cause memory leaks. So this commit introduces binder_alloc_shrinker_exit() and calls it in the wrong path to fix that.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's binder driver during initialization can exhaust system memory; fixed by adding a proper cleanup on error path.
Vulnerability
In the Linux kernel's binder driver, the binder_init() function fails to properly clean up the binder_alloc_shrinker_init() allocation when an error occurs an error later in the initialization path. This missing deallocation causes a memory leak [1].
Exploitation
The vulnerability is triggered during system boot when the binder module is initialized. No special privileges or user interaction are required; the leak occurs automatically on any system that loads the binder driver (common in Android environments). An attacker with local access could potentially force repeated module loads to accelerate memory exhaustion.
Impact
Over time, the unreleased memory accumulates, leading to gradual system memory pressure and potential denial of service. The leak is limited to the initialization phase, but repeated module loading (if possible) could exacerbate the issue.
Mitigation
The fix introduces binder_alloc_shrinker_exit() and calls it on the error path in binder_init() [1]. Patches have been applied to stable kernel trees [2][3][4]. Users should update to a kernel containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8486dd742ba18ceb0f8cc987fb97dad01c121d7e5e2b87f5d03eebad96233f11a26633eb6ee95051c0c19adb9743d6a08Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/03eebad96233397f951d8e9fafd82a1674a77284nvd
- git.kernel.org/stable/c/486dd742ba186ea333664c517d6775b06b1448canvd
- git.kernel.org/stable/c/adb9743d6a08778b78d62d16b4230346d3508986nvd
- git.kernel.org/stable/c/b97dad01c12169991f895de3d4f61b8115d12babnvd
- git.kernel.org/stable/c/ceb0f8cc987fb3d25c06b9662e08a42f99651207nvd
- git.kernel.org/stable/c/d7e5e2b87f5d27469075b6326b6b358e38cd9dcbnvd
- git.kernel.org/stable/c/ee95051c0c1928051f86198bf5e554277a53b26bnvd
- git.kernel.org/stable/c/f11a26633eb6d3bb24a10b1bacc4e4a9b0c6389fnvd
News mentions
0No linked articles in our index yet.