Impact
The V3D DRM driver in the Linux kernel fails to initialize the maximum DMA segment size. When CONFIG_DMA_API_DEBUG is enabled, the driver defaults to 64 KiB and issues verbose debug warnings whenever a buffer larger than this value is mapped. The defect triggers a harmless log entry. Based on the description, it is inferred that the bug does not alter control flow, privilege levels, or data confidentiality, and corresponds to incorrect handling of the size of a DMA segment (CWE-131).
Affected Systems
All Linux kernel builds that load the V3D DRM driver and have CONFIG_DMA_API_DEBUG enabled are impacted. Recent Raspberry Pi 5 systems running kernel 6.12.53‑yocto‑standard and any other releases that have not applied the patch that sets max_seg_size to the device’s true maximum fall into this category.
Risk and Exploitability
Because the issue merely produces debug messages, it does not provide a code‑execution path, data disclosure, or integrity breach. The vulnerability is not listed in CISA KEV, and an EPSS score is not available, indicating no known exploitation. Based on the description, it is inferred that a local user with sufficient privileges to trigger debug output would see the warnings but would not achieve additional compromise. The risk remains negligible for most environments.
OpenCVE Enrichment