Description
In the Linux kernel, the following vulnerability has been resolved:

platform/x86: toshiba_haps: Fix memory leaks in add/remove routines

toshiba_haps_add() leaks the haps object allocated by it if it returns
an error after allocating that object successfully.

toshiba_haps_remove() does not free the object pointed to by
toshiba_haps before clearing that pointer, so it becomes unreachable
allocated memory.

Address these memory leaks by using devm_kzalloc() for allocating
the memory in question.
Published: 2026-02-14
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Memory Leak
Action: Patch Update
AI Analysis

Impact

The vulnerability involves improper deallocation in the Toshiba HAPS module of the Linux kernel. If toshiba_haps_add() fails after allocating its haps object, the allocation is not freed, creating a leak. When toshiba_haps_remove() clears the pointer before freeing the object, that memory also becomes unreachable. These leaks accumulate over time, consuming kernel memory and can lead to a degradation of system performance or even a kernel out‑of‑memory condition, which may result in a denial‑of‑service. The weakness aligns with CWE‑401.

Affected Systems

Affected systems are Linux kernel instances that compile the x86 platform Toshiba HAPS driver. Any kernel version that includes the buggy implementation of toshiba_haps_add and toshiba_haps_remove is susceptible, regardless of distribution; the exact affected releases are not enumerated in the advisory.

Risk and Exploitability

Risk is low exploitation probability: the EPSS score is below 1% and the vulnerability is not listed in CISA KEV. The bug is local, requiring access to the kernel to trigger the faulty routines, and there are no known remote exploits. The primary threat is accidental resource exhaustion as the bug is not user‑controllable, but a prolonged leak could lead to a denial‑of‑service scenario if the kernel runs out of memory.

Generated by OpenCVE AI on April 18, 2026 at 12:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel version that incorporates the devm_kzalloc allocation changes for toshiba_haps.
  • If an updated kernel is not available, backport the patch manually from the commit references linked in the advisory.
  • After applying the fix, perform a memory usage audit using tools such as top, vmstat, or dmesg, ensuring that no memory growth associated with the HAPS driver occurs over time.
  • Keep the kernel up‑to‑date with vendor releases and monitor advisories for related memory exhaustion issues.

Generated by OpenCVE AI on April 18, 2026 at 12:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4498-1 linux security update
Debian DLA Debian DLA DLA-4499-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6141-1 linux security update
Debian DSA Debian DSA DSA-6163-1 linux security update
History

Tue, 17 Feb 2026 00:15:00 +0000


Sat, 14 Feb 2026 16:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_haps: Fix memory leaks in add/remove routines toshiba_haps_add() leaks the haps object allocated by it if it returns an error after allocating that object successfully. toshiba_haps_remove() does not free the object pointed to by toshiba_haps before clearing that pointer, so it becomes unreachable allocated memory. Address these memory leaks by using devm_kzalloc() for allocating the memory in question.
Title platform/x86: toshiba_haps: Fix memory leaks in add/remove routines
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-14T16:27:08.764Z

Reserved: 2026-01-13T15:37:45.983Z

Link: CVE-2026-23176

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-02-14T17:15:55.320

Modified: 2026-04-15T14:34:27.800

Link: CVE-2026-23176

cve-icon Redhat

Severity :

Publid Date: 2026-02-14T00:00:00Z

Links: CVE-2026-23176 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:30:45Z

Weaknesses

No weakness.