-

CVE-2026-23049

In the Linux kernel, the following vulnerability has been resolved:

drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel

The connector type for the DataImage SCF0700C48GGU18 panel is missing and
devm_drm_panel_bridge_add() requires connector type to be set. This leads
to a warning and a backtrace in the kernel log and panel does not work:
"
WARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8
"
The warning is triggered by a check for valid connector type in
devm_drm_panel_bridge_add(). If there is no valid connector type
set for a panel, the warning is printed and panel is not added.
Fill in the missing connector type to fix the warning and make
the panel operational once again.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < f4c330b4499e7334ec6fce535574e09d55843d71
Version 97ceb1fb08b6a2f78aa44a7c229ca280964860c0
Status affected
Version < bb309377eece5317207d71fd833f99cca4727fbd
Version 97ceb1fb08b6a2f78aa44a7c229ca280964860c0
Status affected
Version < 83e0d8d22e7ee3151af1951595104887eebed6ab
Version 97ceb1fb08b6a2f78aa44a7c229ca280964860c0
Status affected
Version < bc0b17bdba3838e9e17e7e9adc968384ac99938b
Version 97ceb1fb08b6a2f78aa44a7c229ca280964860c0
Status affected
Version < 04218cd68d1502000823c8288f37b4f171dcdcae
Version 97ceb1fb08b6a2f78aa44a7c229ca280964860c0
Status affected
Version < f7940d3ec1dc6bf719eddc69d4b8e52cc2201896
Version 97ceb1fb08b6a2f78aa44a7c229ca280964860c0
Status affected
Version < 6ab3d4353bf75005eaa375677c9fed31148154d6
Version 97ceb1fb08b6a2f78aa44a7c229ca280964860c0
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.19
Status affected
Version < 4.19
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.249
Status unaffected
Version <= 5.15.*
Version 5.15.199
Status unaffected
Version <= 6.1.*
Version 6.1.162
Status unaffected
Version <= 6.6.*
Version 6.6.122
Status unaffected
Version <= 6.12.*
Version 6.12.67
Status unaffected
Version <= 6.18.*
Version 6.18.7
Status unaffected
Version <= *
Version 6.19
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.099
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.