CVE-2023-52826

Source
https://cve.org/CVERecord?id=CVE-2023-52826
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52826.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52826
Downstream
Related
Published
2024-05-21T15:31:30.184Z
Modified
2026-04-11T12:46:37.193250Z
Summary
drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference

In tpg110getmodes(), the return value of drmmodeduplicate() is assigned to mode, which will lead to a NULL pointer dereference on failure of drmmodeduplicate(). Add a check to avoid npd.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52826.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
324bb707d2a53256f3c04ba2e86048427e2a822c
Fixed
9acc2bc00135e9ecd13a70ce1140e2673e504cdc
Fixed
84c923d898905187ebfd4c0ef38cd1450af7e0ea
Fixed
d0bc9ab0a161a9745273f5bf723733a8e6c57aca
Fixed
9268bfd76bebc85ff221691b61498cc16d75451c
Fixed
eaede6900c0961b072669d6bd97fe8f90ed1900f
Fixed
f22def5970c423ea7f87d5247bd0ef91416b0658

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52826.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1.0
Fixed
5.10.202
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.140
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.64
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.13
Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52826.json"