-

CVE-2026-23176

In the Linux kernel, the following vulnerability has been resolved:

platform/x86: toshiba_haps: Fix memory leaks in add/remove routines

toshiba_haps_add() leaks the haps object allocated by it if it returns
an error after allocating that object successfully.

toshiba_haps_remove() does not free the object pointed to by
toshiba_haps before clearing that pointer, so it becomes unreachable
allocated memory.

Address these memory leaks by using devm_kzalloc() for allocating
the memory in question.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 17f37c4cdf42a9e4915216b9e130fc8baef4cc64
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Status affected
Version < 5bce10f0f9435afaae3fc4df9a52b01d9b3853dc
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Status affected
Version < f2093e87ddec13e7a920f326c078a5f765ba89c3
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Status affected
Version < ca9ff71c15bc8e48529c2033294a519a7749b272
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Status affected
Version < bf0474356875d005d420f8c6b9ac168566e72e87
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Status affected
Version < f93ae43780b759a70734be9bc82c1adcf7f33208
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Status affected
Version < 128497456756e1b952bd5a912cd073836465109d
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.17
Status affected
Version < 3.17
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.250
Status unaffected
Version <= 5.15.*
Version 5.15.200
Status unaffected
Version <= 6.1.*
Version 6.1.163
Status unaffected
Version <= 6.6.*
Version 6.6.124
Status unaffected
Version <= 6.12.*
Version 6.12.70
Status unaffected
Version <= 6.18.*
Version 6.18.10
Status unaffected
Version <= *
Version 6.19
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.189
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.