CVE-2023-54157
Use-After-Free Vulnerability in Linux Kernel Binder Component
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10 |
| linux | kernel | 5.10 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) issue in the Linux kernel's binder component. It occurs due to a race condition between binder_update_page_range() and munmap() functions. Specifically, binder_update_page_range() assumed that holding a read lock on mmap was sufficient to protect a pointer (alloc->vma), but changes in the kernel caused munmap() to free this memory while only holding a read lock, leading to a race where binder_update_page_range() can access freed memory. This results in a use-after-free bug that can cause crashes or undefined behavior. The fix involved reverting to taking a write lock to properly synchronize access and prevent the race.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free conditions in the Linux kernel binder driver, potentially causing system crashes, memory corruption, or undefined behavior. Such issues can be exploited to destabilize the system or possibly escalate privileges, depending on the context in which binder is used. Therefore, it poses a risk to system stability and security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix which reverts to taking the mmap write lock inside binder_update_page_range(). This prevents the use-after-free condition caused by the race with munmap().