### [CVE-2025-21978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21978) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=a0ab5abced550ddeefddb06055ed60779a54eb79%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:drm/hyperv: Fix address space leak when Hyper-V DRM device is removedWhen a Hyper-V DRM device is probed, the driver allocates MMIO space forthe vram, and maps it cacheable. If the device removed, or in the errorpath for device probing, the MMIO space is released but no unmap is done.Consequently the kernel address space for the mapping is leaked.Fix this by adding iounmap() calls in the device removal path, and in theerror path during device probing. ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security