-

CVE-2026-23176

platform/x86: toshiba_haps: Fix memory leaks in add/remove routines

In the Linux kernel, the following vulnerability has been resolved:

platform/x86: toshiba_haps: Fix memory leaks in add/remove routines

toshiba_haps_add() leaks the haps object allocated by it if it returns
an error after allocating that object successfully.

toshiba_haps_remove() does not free the object pointed to by
toshiba_haps before clearing that pointer, so it becomes unreachable
allocated memory.

Address these memory leaks by using devm_kzalloc() for allocating
the memory in question.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Version < 17f37c4cdf42a9e4915216b9e130fc8baef4cc64
Status affected
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Version < 5bce10f0f9435afaae3fc4df9a52b01d9b3853dc
Status affected
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Version < f2093e87ddec13e7a920f326c078a5f765ba89c3
Status affected
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Version < ca9ff71c15bc8e48529c2033294a519a7749b272
Status affected
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Version < bf0474356875d005d420f8c6b9ac168566e72e87
Status affected
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Version < f93ae43780b759a70734be9bc82c1adcf7f33208
Status affected
Version 23d0ba0c908ac10139f0351023c64198d7fc1409
Version < 128497456756e1b952bd5a912cd073836465109d
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.17
Status affected
Version 0
Version < 3.17
Status unaffected
Version <= 5.10.*
Version 5.10.250
Status unaffected
Version <= 5.15.*
Version 5.15.200
Status unaffected
Version <= 6.1.*
Version 6.1.163
Status unaffected
Version <= 6.6.*
Version 6.6.124
Status unaffected
Version <= 6.12.*
Version 6.12.70
Status unaffected
Version <= 6.18.*
Version 6.18.10
Status unaffected
Version <= *
Version 6.19
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.163
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.