{"id":"CVE-2026-23049","summary":"drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel\n\nThe connector type for the DataImage SCF0700C48GGU18 panel is missing and\ndevm_drm_panel_bridge_add() requires connector type to be set. This leads\nto a warning and a backtrace in the kernel log and panel does not work:\n\"\nWARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8\n\"\nThe warning is triggered by a check for valid connector type in\ndevm_drm_panel_bridge_add(). If there is no valid connector type\nset for a panel, the warning is printed and panel is not added.\nFill in the missing connector type to fix the warning and make\nthe panel operational once again.","modified":"2026-04-02T17:30:51.333340Z","published":"2026-02-04T16:04:18.076Z","related":["SUSE-SU-2026:0962-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20667-1","SUSE-SU-2026:20720-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","SUSE-SU-2026:20931-1","openSUSE-SU-2026:20416-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23049.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/04218cd68d1502000823c8288f37b4f171dcdcae"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6ab3d4353bf75005eaa375677c9fed31148154d6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/83e0d8d22e7ee3151af1951595104887eebed6ab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb309377eece5317207d71fd833f99cca4727fbd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bc0b17bdba3838e9e17e7e9adc968384ac99938b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f4c330b4499e7334ec6fce535574e09d55843d71"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f7940d3ec1dc6bf719eddc69d4b8e52cc2201896"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23049.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23049"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"97ceb1fb08b6a2f78aa44a7c229ca280964860c0"},{"fixed":"f4c330b4499e7334ec6fce535574e09d55843d71"},{"fixed":"bb309377eece5317207d71fd833f99cca4727fbd"},{"fixed":"83e0d8d22e7ee3151af1951595104887eebed6ab"},{"fixed":"bc0b17bdba3838e9e17e7e9adc968384ac99938b"},{"fixed":"04218cd68d1502000823c8288f37b4f171dcdcae"},{"fixed":"f7940d3ec1dc6bf719eddc69d4b8e52cc2201896"},{"fixed":"6ab3d4353bf75005eaa375677c9fed31148154d6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23049.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.19.0"},{"fixed":"5.10.249"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.199"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.162"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.122"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.67"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.7"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23049.json"}}],"schema_version":"1.7.5"}