CVE-2026-23176
📋 TL;DR
This CVE describes a memory leak vulnerability in the Linux kernel's Toshiba HAPS driver. The vulnerability occurs when the driver fails to properly free allocated memory during error conditions in add/remove routines, potentially leading to kernel memory exhaustion over time. This affects Linux systems with the toshiba_haps driver loaded, typically on Toshiba hardware.
💻 Affected Systems
- Linux kernel with toshiba_haps driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or kernel panic.
Likely Case
Gradual memory consumption over time leading to performance degradation or system instability requiring reboot.
If Mitigated
Minimal impact with proper monitoring and memory management controls in place.
🎯 Exploit Status
Requires ability to trigger driver add/remove operations, typically through privileged access or hardware interaction
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel versions with commits 128497456756e1b952bd5a912cd073836465109d and related fixes
Vendor Advisory: https://git.kernel.org/stable/c/128497456756e1b952bd5a912cd073836465109d
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Reboot system to load new kernel. 3. Verify driver functionality if using Toshiba HAPS features.
🔧 Temporary Workarounds
Disable toshiba_haps module
LinuxPrevent loading of vulnerable driver module
echo 'blacklist toshiba_haps' >> /etc/modprobe.d/blacklist.conf
rmmod toshiba_haps
🧯 If You Can't Patch
- Monitor system memory usage for unusual consumption patterns
- Implement kernel memory usage alerts and automated remediation for high memory conditions
🔍 How to Verify
Check if Vulnerable:
Check if toshiba_haps module is loaded: lsmod | grep toshiba_haps
Check Version:
uname -r
Verify Fix Applied:
Check kernel version against patched versions and verify module loads without memory leaks
📡 Detection & Monitoring
Log Indicators:
- Kernel OOM (Out of Memory) messages
- System instability logs
- Memory allocation failure messages
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("Out of memory" OR "kernel panic" OR "slab allocation failure")
🔗 References
- https://git.kernel.org/stable/c/128497456756e1b952bd5a912cd073836465109d
- https://git.kernel.org/stable/c/17f37c4cdf42a9e4915216b9e130fc8baef4cc64
- https://git.kernel.org/stable/c/5bce10f0f9435afaae3fc4df9a52b01d9b3853dc
- https://git.kernel.org/stable/c/bf0474356875d005d420f8c6b9ac168566e72e87
- https://git.kernel.org/stable/c/ca9ff71c15bc8e48529c2033294a519a7749b272
- https://git.kernel.org/stable/c/f2093e87ddec13e7a920f326c078a5f765ba89c3
- https://git.kernel.org/stable/c/f93ae43780b759a70734be9bc82c1adcf7f33208