CVE-2025-21842
amdkfd: properly free gang_ctx_bo when failed to init user queue
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: amdkfd: properly free gang_ctx_bo when failed to init user queue The destructor of a gtt bo is declared as void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj); Which takes void** as the second parameter. GCC allows passing void* to the function because void* can be implicitly casted to any other types, so it can pass compiling. However, passing this void* parameter into the function's execution process(which expects void** and dereferencing void**) will result in errors.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Mar 7, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
fb91065851cd5f2735348c5f3eddeeca3d7c2973 < ae5ab1c1ae504f622cc1ff48830a9ed48428146d fb91065851cd5f2735348c5f3eddeeca3d7c2973 < 091a68c58c1bbd2ab7d05d1b32c1306394ec691d fb91065851cd5f2735348c5f3eddeeca3d7c2973 < a33f7f9660705fb2ecf3467b2c48965564f392ce
Linux / Linux
6.12