CVE-2025-21977
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-21977 affects the Linux kernel's hypervfb driver, specifically impacting Gen 2 Hyper-V VMs that boot via EFI. The vulnerability was discovered on April 1, 2025, and involves a system hang issue when running kdump kernel in Hyper-V Gen 2 VMs. The problem occurs due to incorrect framebuffer address handling when the hypervfb driver moves the framebuffer to a different MMIO address (NVD CVE, CVE MITRE).

Technical details

The vulnerability manifests when the hypervfb driver in the original kernel moves the framebuffer to a different MMIO address due to conflicts with an already-running efifb or simplefb driver. While the hypervfb driver informs Hyper-V of this change through the Hyper-V FB VMBus device protocol, the kexecfileload() system call remains unaware of the framebuffer movement. This results in the kdump screen_info being set up with the original framebuffer address. Since the transition to kdump kernel bypasses the Hyper-V host, the framebuffer address isn't reset as it would be during a reboot (NVD CVE).

Impact

When the vulnerability is triggered, the efifb driver attempts to access a non-existent framebuffer address, causing traps to the Hyper-V host. After multiple such access attempts, the Hyper-V host interprets this as potentially malicious behavior and throttles the guest VM to the point where it appears to hang or runs extremely slowly (NVD CVE).

Mitigation and workarounds

The fix involves reordering the steps in hypervfb so that conflicting framebuffers are removed before allocating an MMIO address. This approach ensures the default framebuffer MMIO address is always available, eliminating confusion about which framebuffer address the kdump kernel should use. This solution is consistent with the approach already implemented in the hypervdrm driver and aligns with the usage guidelines for the apertureremoveconflicting_devices() function (NVD CVE).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • linux-iot
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-devel-matched
NoYesDec 09, 2025
CVE-2025-40340MEDIUM6.4
  • Linux KernelLinux Kernel
  • linux-hwe
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-core
NoYesDec 09, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • libperf-devel
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management