In the Linux kernel, the following vulnerability has been resolved:
drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference In
tpg110_get_modes(), the return value of drm_mode_duplicate() is assigned to
mode, which will lead to a NULL pointer dereference on failure of
drm_mode_duplicate(). Add a check to avoid npd.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.5 | < any | UNKNOWN |
git.kernel.org/linus/f22def5970c423ea7f87d5247bd0ef91416b0658 (6.7-rc1)
git.kernel.org/stable/c/84c923d898905187ebfd4c0ef38cd1450af7e0ea
git.kernel.org/stable/c/9268bfd76bebc85ff221691b61498cc16d75451c
git.kernel.org/stable/c/9acc2bc00135e9ecd13a70ce1140e2673e504cdc
git.kernel.org/stable/c/d0bc9ab0a161a9745273f5bf723733a8e6c57aca
git.kernel.org/stable/c/eaede6900c0961b072669d6bd97fe8f90ed1900f
git.kernel.org/stable/c/f22def5970c423ea7f87d5247bd0ef91416b0658
launchpad.net/bugs/cve/CVE-2023-52826
nvd.nist.gov/vuln/detail/CVE-2023-52826
security-tracker.debian.org/tracker/CVE-2023-52826
www.cve.org/CVERecord?id=CVE-2023-52826