CVE-2026-23176

N/A Unknown

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's Toshiba HAPS driver. The vulnerability occurs when the driver fails to properly free allocated memory during error conditions in add/remove routines, potentially leading to kernel memory exhaustion over time. This affects Linux systems with the toshiba_haps driver loaded, typically on Toshiba hardware.

💻 Affected Systems

Products:
  • Linux kernel with toshiba_haps driver
Versions: Linux kernel versions containing the vulnerable driver code prior to fixes
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if toshiba_haps driver is loaded (typically on Toshiba hardware)

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or kernel panic.

🟠

Likely Case

Gradual memory consumption over time leading to performance degradation or system instability requiring reboot.

🟢

If Mitigated

Minimal impact with proper monitoring and memory management controls in place.

🌐 Internet-Facing: LOW - Requires local access or kernel module loading capability.
🏢 Internal Only: MEDIUM - Could affect system stability on vulnerable Toshiba hardware in enterprise environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to trigger driver add/remove operations, typically through privileged access or hardware interaction

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions with commits 128497456756e1b952bd5a912cd073836465109d and related fixes

Vendor Advisory: https://git.kernel.org/stable/c/128497456756e1b952bd5a912cd073836465109d

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system to load new kernel. 3. Verify driver functionality if using Toshiba HAPS features.

🔧 Temporary Workarounds

Disable toshiba_haps module

Linux

Prevent loading of vulnerable driver module

echo 'blacklist toshiba_haps' >> /etc/modprobe.d/blacklist.conf
rmmod toshiba_haps

🧯 If You Can't Patch

  • Monitor system memory usage for unusual consumption patterns
  • Implement kernel memory usage alerts and automated remediation for high memory conditions

🔍 How to Verify

Check if Vulnerable:

Check if toshiba_haps module is loaded: lsmod | grep toshiba_haps

Check Version:

uname -r

Verify Fix Applied:

Check kernel version against patched versions and verify module loads without memory leaks

📡 Detection & Monitoring

Log Indicators:

  • Kernel OOM (Out of Memory) messages
  • System instability logs
  • Memory allocation failure messages

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("Out of memory" OR "kernel panic" OR "slab allocation failure")

🔗 References

📤 Share & Export