CVE-2025-21978: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/hyperv: Fix address space leak when Hyper-V DRM device is removed When a Hyper-V DRM device is probed, the driver allocates MMIO space for the vram, and maps it cacheable. If the device removed, or in the error path for device probing, the MMIO space is released but no unmap is done. Consequently the kernel address space for the mapping is leaked. Fix this by adding iounmap() calls in the device removal path, and in the error path during device probing.
AI Analysis
Technical Summary
CVE-2025-21978 is a vulnerability identified in the Linux kernel's drm/hyperv driver, which handles the Hyper-V Direct Rendering Manager (DRM) device. The issue arises during the probing and removal of the Hyper-V DRM device. When the device is probed, the driver allocates memory-mapped I/O (MMIO) space for the video RAM (vram) and maps it as cacheable in the kernel address space. However, if the device is removed or an error occurs during probing, the MMIO space is released but the corresponding unmapping of the kernel address space is not performed. This results in a kernel address space leak, where the mapped memory remains reserved and inaccessible, potentially leading to resource exhaustion or degraded system performance over time. The fix involves adding calls to iounmap() in both the device removal path and the error path during device probing to ensure that the MMIO space is properly unmapped and released. This vulnerability is specific to Linux kernels running on Hyper-V virtualized environments where the Hyper-V DRM device is present. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-21978 primarily concerns systems running Linux kernels on Microsoft Hyper-V virtualization platforms, which are common in enterprise data centers and cloud environments. The kernel address space leak can lead to gradual resource depletion, potentially causing system instability, degraded performance, or denial of service conditions if the leak accumulates over time. This can affect critical infrastructure, virtualized workloads, and services relying on Hyper-V-based Linux virtual machines. While the vulnerability does not directly allow privilege escalation or remote code execution, the indirect impact on availability and system reliability can disrupt business operations, especially in environments with high VM churn or frequent device probing/removal. European organizations with large-scale virtualized environments or those using Hyper-V for Linux workloads should be aware of this vulnerability to prevent potential operational disruptions.
Mitigation Recommendations
To mitigate CVE-2025-21978, European organizations should: 1) Apply the official Linux kernel patches that include the iounmap() fixes for the drm/hyperv driver as soon as they become available from trusted Linux distributions or kernel maintainers. 2) Monitor and audit virtual machine lifecycle operations on Hyper-V hosts to identify frequent device probing or removal events that could exacerbate the leak. 3) Implement proactive system monitoring to detect abnormal kernel memory usage or address space exhaustion symptoms. 4) Where possible, limit the use of Hyper-V DRM devices in Linux VMs if not required, or isolate affected VMs to reduce risk exposure. 5) Coordinate with virtualization platform administrators to ensure that Hyper-V host and guest integration components are up to date and consistent with security best practices. 6) Maintain robust backup and recovery procedures to minimize operational impact in case of system instability caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium, Italy, Spain
CVE-2025-21978: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/hyperv: Fix address space leak when Hyper-V DRM device is removed When a Hyper-V DRM device is probed, the driver allocates MMIO space for the vram, and maps it cacheable. If the device removed, or in the error path for device probing, the MMIO space is released but no unmap is done. Consequently the kernel address space for the mapping is leaked. Fix this by adding iounmap() calls in the device removal path, and in the error path during device probing.
AI-Powered Analysis
Technical Analysis
CVE-2025-21978 is a vulnerability identified in the Linux kernel's drm/hyperv driver, which handles the Hyper-V Direct Rendering Manager (DRM) device. The issue arises during the probing and removal of the Hyper-V DRM device. When the device is probed, the driver allocates memory-mapped I/O (MMIO) space for the video RAM (vram) and maps it as cacheable in the kernel address space. However, if the device is removed or an error occurs during probing, the MMIO space is released but the corresponding unmapping of the kernel address space is not performed. This results in a kernel address space leak, where the mapped memory remains reserved and inaccessible, potentially leading to resource exhaustion or degraded system performance over time. The fix involves adding calls to iounmap() in both the device removal path and the error path during device probing to ensure that the MMIO space is properly unmapped and released. This vulnerability is specific to Linux kernels running on Hyper-V virtualized environments where the Hyper-V DRM device is present. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-21978 primarily concerns systems running Linux kernels on Microsoft Hyper-V virtualization platforms, which are common in enterprise data centers and cloud environments. The kernel address space leak can lead to gradual resource depletion, potentially causing system instability, degraded performance, or denial of service conditions if the leak accumulates over time. This can affect critical infrastructure, virtualized workloads, and services relying on Hyper-V-based Linux virtual machines. While the vulnerability does not directly allow privilege escalation or remote code execution, the indirect impact on availability and system reliability can disrupt business operations, especially in environments with high VM churn or frequent device probing/removal. European organizations with large-scale virtualized environments or those using Hyper-V for Linux workloads should be aware of this vulnerability to prevent potential operational disruptions.
Mitigation Recommendations
To mitigate CVE-2025-21978, European organizations should: 1) Apply the official Linux kernel patches that include the iounmap() fixes for the drm/hyperv driver as soon as they become available from trusted Linux distributions or kernel maintainers. 2) Monitor and audit virtual machine lifecycle operations on Hyper-V hosts to identify frequent device probing or removal events that could exacerbate the leak. 3) Implement proactive system monitoring to detect abnormal kernel memory usage or address space exhaustion symptoms. 4) Where possible, limit the use of Hyper-V DRM devices in Linux VMs if not required, or isolate affected VMs to reduce risk exposure. 5) Coordinate with virtualization platform administrators to ensure that Hyper-V host and guest integration components are up to date and consistent with security best practices. 6) Maintain robust backup and recovery procedures to minimize operational impact in case of system instability caused by this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.798Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8dfe
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 11:27:14 AM
Last updated: 8/14/2025, 2:52:01 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.