In the Linux kernel, the following vulnerability has been resolved: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference In tpg110_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
git.kernel.org/linus/f22def5970c423ea7f87d5247bd0ef91416b0658
git.kernel.org/stable/c/84c923d898905187ebfd4c0ef38cd1450af7e0ea
git.kernel.org/stable/c/9268bfd76bebc85ff221691b61498cc16d75451c
git.kernel.org/stable/c/9acc2bc00135e9ecd13a70ce1140e2673e504cdc
git.kernel.org/stable/c/d0bc9ab0a161a9745273f5bf723733a8e6c57aca
git.kernel.org/stable/c/eaede6900c0961b072669d6bd97fe8f90ed1900f
git.kernel.org/stable/c/f22def5970c423ea7f87d5247bd0ef91416b0658
ubuntu.com/security/CVE-2023-52826
www.cve.org/CVERecord?id=CVE-2023-52826