CVE-2026-23176
Description
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: toshiba_haps: Fix memory leaks in add/remove routines
toshiba_haps_add() leaks the haps object allocated by it if it returns an error after allocating that object successfully.
toshiba_haps_remove() does not free the object pointed to by toshiba_haps before clearing that pointer, so it becomes unreachable allocated memory.
Address these memory leaks by using devm_kzalloc() for allocating the memory in question.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2026-23176 fixes two memory leaks in the Linux kernel's toshiba_haps driver when adding or removing the device.
Vulnerability
Description
The toshiba_haps driver in the Linux kernel contained two memory leak vulnerabilities in its add and remove routines [1][2]. In toshiba_haps_add(), if an error occurs after allocating the haps object but before successful completion, the allocated memory was not freed, causing a leak. In toshiba_haps_remove(), the pointer to the allocated haps object was cleared without freeing the memory it pointed to, making that memory unreachable [3].
Exploitation
Analysis
These are memory leak bugs that occur during normal driver loading and unloading cycles. An attacker would need to repeatedly trigger the device add/remove sequence—for example by hot-plugging or through system suspend/resume—to exhaust kernel memory. No special privileges are required beyond the ability to cause the driver to bind/unbind, which may be achievable by a local user with access to sysfs or through module reloads [1].
Impact
Over time, the accumulated unreleased memory can exhaust the kernel's memory pool, leading to system instability or denial of service. No data confidentiality or integrity impact is expected, as the vulnerability only affects memory allocation and not the data stored in that memory [2].
Mitigation
The issue was resolved by switching to devm_kzalloc(), which automatically frees the allocated memory when the device is removed or if the probe fails [3]. Linux kernel stable branches have received the backported fix. Users should update to a kernel version containing the commit referenced in the advisory.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/128497456756e1b952bd5a912cd073836465109dnvd
- git.kernel.org/stable/c/17f37c4cdf42a9e4915216b9e130fc8baef4cc64nvd
- git.kernel.org/stable/c/5bce10f0f9435afaae3fc4df9a52b01d9b3853dcnvd
- git.kernel.org/stable/c/bf0474356875d005d420f8c6b9ac168566e72e87nvd
- git.kernel.org/stable/c/ca9ff71c15bc8e48529c2033294a519a7749b272nvd
- git.kernel.org/stable/c/f2093e87ddec13e7a920f326c078a5f765ba89c3nvd
- git.kernel.org/stable/c/f93ae43780b759a70734be9bc82c1adcf7f33208nvd
News mentions
0No linked articles in our index yet.