Description
In the Linux kernel, the following vulnerability has been resolved:

drm/i915/dsi: Don't do DSC horizontal timing adjustments in command mode

Stop adjusting the horizontal timing values based on the
compression ratio in command mode. Bspec seems to be telling
us to do this only in video mode, and this is also how the
Windows driver does things.

This should also fix a div-by-zero on some machines because
the adjusted htotal ends up being so small that we end up with
line_time_us==0 when trying to determine the vtotal value in
command mode.

Note that this doesn't actually make the display on the
Huawei Matebook E work, but at least the kernel no longer
explodes when the driver loads.

(cherry picked from commit 0b475e91ecc2313207196c6d7fd5c53e1a878525)
Published: 2026-05-01
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the Linux kernel DRM i915 DSI driver where the driver applied horizontal timing adjustments for display hardware in command mode. This incorrect behavior leads to a divide‑by‑zero condition during the calculation of display parameters, causing the kernel to crash or panic. The crash effectively results in a denial of service, disrupting kernel operation and requiring a reboot to recover.

Affected Systems

Affected systems are Linux kernels that include the i915 DSI driver prior to the patches included in commit 0b475e91. No specific version ranges are listed in the data, and the vulnerability is therefore potentially present in any kernel build that has not yet integrated this commit. The vulnerability is limited to devices using Intel graphics hardware that are configured in command mode for DSI output.

Risk and Exploitability

There is no reported EPSS score and the vulnerability is not listed in the CISA KEV catalog, indicating that there is no publicly known exploitation activity. The primary risk remains a local denial of service, as it requires a critical path in the kernel and is unlikely to be triggered by an unprivileged user. A CVSS score of 7.0 indicates a high severity, confirming that the kernel crash could seriously impact system stability.

Generated by OpenCVE AI on May 2, 2026 at 07:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that contains commit 0b475e91 or backport the patch before compiling your kernel.
  • If possible, avoid configuring the Intel DSI interface in command mode; use video mode or disable the feature entirely.
  • Check dmesg logs and other kernel messages for signs of the bug and verify that the running i915 driver is the corrected version.

Generated by OpenCVE AI on May 2, 2026 at 07:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-369
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/i915/dsi: Don't do DSC horizontal timing adjustments in command mode Stop adjusting the horizontal timing values based on the compression ratio in command mode. Bspec seems to be telling us to do this only in video mode, and this is also how the Windows driver does things. This should also fix a div-by-zero on some machines because the adjusted htotal ends up being so small that we end up with line_time_us==0 when trying to determine the vtotal value in command mode. Note that this doesn't actually make the display on the Huawei Matebook E work, but at least the kernel no longer explodes when the driver loads. (cherry picked from commit 0b475e91ecc2313207196c6d7fd5c53e1a878525)
Title drm/i915/dsi: Don't do DSC horizontal timing adjustments in command mode
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:57.287Z

Reserved: 2026-03-09T15:48:24.140Z

Link: CVE-2026-31767

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:39.870

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31767

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31767 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:30:36Z

Weaknesses