{"id":"CVE-2023-54005","summary":"binder: fix memory leak in binder_init()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix memory leak in binder_init()\n\nIn binder_init(), the destruction of binder_alloc_shrinker_init() is not\nperformed in the wrong path, which will cause memory leaks. So this commit\nintroduces binder_alloc_shrinker_exit() and calls it in the wrong path to\nfix that.","modified":"2026-03-31T17:29:45.730993427Z","published":"2025-12-24T10:55:39.826Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54005.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/03eebad96233397f951d8e9fafd82a1674a77284"},{"type":"WEB","url":"https://git.kernel.org/stable/c/486dd742ba186ea333664c517d6775b06b1448ca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/adb9743d6a08778b78d62d16b4230346d3508986"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b97dad01c12169991f895de3d4f61b8115d12bab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ceb0f8cc987fb3d25c06b9662e08a42f99651207"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d7e5e2b87f5d27469075b6326b6b358e38cd9dcb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee95051c0c1928051f86198bf5e554277a53b26b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f11a26633eb6d3bb24a10b1bacc4e4a9b0c6389f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54005.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54005"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f2517eb76f1f2f7f89761f9db2b202e89931738c"},{"fixed":"486dd742ba186ea333664c517d6775b06b1448ca"},{"fixed":"ceb0f8cc987fb3d25c06b9662e08a42f99651207"},{"fixed":"b97dad01c12169991f895de3d4f61b8115d12bab"},{"fixed":"d7e5e2b87f5d27469075b6326b6b358e38cd9dcb"},{"fixed":"03eebad96233397f951d8e9fafd82a1674a77284"},{"fixed":"f11a26633eb6d3bb24a10b1bacc4e4a9b0c6389f"},{"fixed":"ee95051c0c1928051f86198bf5e554277a53b26b"},{"fixed":"adb9743d6a08778b78d62d16b4230346d3508986"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54005.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.14.0"},{"fixed":"4.14.324"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.292"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.254"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.191"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.127"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.46"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54005.json"}}],"schema_version":"1.7.5"}