๐Ÿ” CVE Alert

CVE-2025-21842

UNKNOWN 0.0

amdkfd: properly free gang_ctx_bo when failed to init user queue

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: amdkfd: properly free gang_ctx_bo when failed to init user queue The destructor of a gtt bo is declared as void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj); Which takes void** as the second parameter. GCC allows passing void* to the function because void* can be implicitly casted to any other types, so it can pass compiling. However, passing this void* parameter into the function's execution process(which expects void** and dereferencing void**) will result in errors.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 7, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
fb91065851cd5f2735348c5f3eddeeca3d7c2973 < ae5ab1c1ae504f622cc1ff48830a9ed48428146d fb91065851cd5f2735348c5f3eddeeca3d7c2973 < 091a68c58c1bbd2ab7d05d1b32c1306394ec691d fb91065851cd5f2735348c5f3eddeeca3d7c2973 < a33f7f9660705fb2ecf3467b2c48965564f392ce
Linux / Linux
6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ae5ab1c1ae504f622cc1ff48830a9ed48428146d git.kernel.org: https://git.kernel.org/stable/c/091a68c58c1bbd2ab7d05d1b32c1306394ec691d git.kernel.org: https://git.kernel.org/stable/c/a33f7f9660705fb2ecf3467b2c48965564f392ce