Description
In the Linux kernel, the following vulnerability has been resolved:

drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel

The connector type for the DataImage SCF0700C48GGU18 panel is missing and
devm_drm_panel_bridge_add() requires connector type to be set. This leads
to a warning and a backtrace in the kernel log and panel does not work:
"
WARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8
"
The warning is triggered by a check for valid connector type in
devm_drm_panel_bridge_add(). If there is no valid connector type
set for a panel, the warning is printed and panel is not added.
Fill in the missing connector type to fix the warning and make
the panel operational once again.
Published: 2026-02-04
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Display Failure
Action: Patch
AI Analysis

Impact

In the Linux kernel, the drm/panel-simple driver lacks a connector type for the DataImage SCF0700C48GGU18 panel. When the driver attempts to add the panel bridge, devm_drm_panel_bridge_add() checks for a valid connector type and, finding none, outputs a warning and backtrace. As a result, the panel is not added and the display fails to operate. This vulnerability does not provide code execution or privilege escalation; it merely prevents the panel from functioning and logs an error. The weakness is an instance of improper initialization, mapped to CWE‑665.

Affected Systems

The issue is confined to the drm/panel-simple driver in the Linux kernel. Any Linux distribution that ships a kernel version containing this driver, without the later patch, is affected when it uses the DataImage SCF0700C48GGU18 panel. No specific kernel version numbers are cited in the advisory, so all versions that include the unpatched driver are potentially vulnerable. Users who rely on that panel should verify whether their running kernel contains the recent commit adding the missing connector type.

Risk and Exploitability

The EPSS score is below 1 % and the vulnerability is not listed in the CISA KEV catalog, indicating a low probability of exploitation. Because the flaw only triggers a warning during driver initialization and requires the panel hardware to be present, it is unlikely to be exploitable for remote or malicious attacks. The absence of privilege escalation or data compromise further reduces the risk, resulting in a localized, low‑severity impact that mainly affects display availability.

Generated by OpenCVE AI on April 18, 2026 at 13:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the fix for the DataImage SCF0700C48GGU18 panel.
  • If no updated kernel is available, add a device tree property that specifies the correct connector type for the panel to suppress the warning and enable the display.
  • When neither updating nor overriding is possible, remove or comment out the panel device node so the system does not attempt to initialize the faulty panel.

Generated by OpenCVE AI on April 18, 2026 at 13:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4475-1 linux security update
Debian DLA Debian DLA DLA-4476-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6126-1 linux security update
Debian DSA Debian DSA DSA-6127-1 linux security update
Ubuntu USN Ubuntu USN USN-8162-1 Linux kernel (NVIDIA Tegra) vulnerabilities
Ubuntu USN Ubuntu USN USN-8180-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8180-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8186-1 Linux kernel (Real-time) vulnerabilities
Ubuntu USN Ubuntu USN USN-8187-1 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-8188-1 Linux kernel (HWE) vulnerabilities
History

Sat, 18 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-665

Fri, 06 Feb 2026 16:45:00 +0000


Thu, 05 Feb 2026 00:15:00 +0000


Wed, 04 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel The connector type for the DataImage SCF0700C48GGU18 panel is missing and devm_drm_panel_bridge_add() requires connector type to be set. This leads to a warning and a backtrace in the kernel log and panel does not work: " WARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8 " The warning is triggered by a check for valid connector type in devm_drm_panel_bridge_add(). If there is no valid connector type set for a panel, the warning is printed and panel is not added. Fill in the missing connector type to fix the warning and make the panel operational once again.
Title drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-09T08:37:45.217Z

Reserved: 2026-01-13T15:37:45.949Z

Link: CVE-2026-23049

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-02-04T17:16:15.557

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23049

cve-icon Redhat

Severity :

Publid Date: 2026-02-04T00:00:00Z

Links: CVE-2026-23049 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:00:02Z

Weaknesses