CVE-2023-52826
Published: May 23, 2024Last modified: May 23, 2024
Description
In the Linux kernel, the following vulnerability has been resolved: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference In tpg110_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.68-r0) |
Stream | linux-lts | Fixed (6.6.58-r0) |
References
- https://git.kernel.org/stable/c/84c923d898905187ebfd4c0ef38cd1450af7e0ea
- https://git.kernel.org/stable/c/9268bfd76bebc85ff221691b61498cc16d75451c
- https://git.kernel.org/stable/c/9acc2bc00135e9ecd13a70ce1140e2673e504cdc
- https://git.kernel.org/stable/c/d0bc9ab0a161a9745273f5bf723733a8e6c57aca
- https://git.kernel.org/stable/c/eaede6900c0961b072669d6bd97fe8f90ed1900f
- https://git.kernel.org/stable/c/f22def5970c423ea7f87d5247bd0ef91416b0658