In the Linux kernel, the following vulnerability has been resolved:
amdkfd: properly free gang_ctx_bo when failed to init user queue
The destructor of a gtt bo is declared as
void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj);
Which takes void** as the second parameter.
GCC allows passing void* to the function because void* can be implicitly
casted to any other types, so it can pass compiling.
However, passing this void* parameter into the function's
execution process(which expects void** and dereferencing void**)
will result in errors.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    29 Oct 2025, 21:08
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/091a68c58c1bbd2ab7d05d1b32c1306394ec691d - Patch | |
| References | () https://git.kernel.org/stable/c/a33f7f9660705fb2ecf3467b2c48965564f392ce - Patch | |
| References | () https://git.kernel.org/stable/c/ae5ab1c1ae504f622cc1ff48830a9ed48428146d - Patch | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.5 | 
| Summary | 
 | |
| First Time | Linux linux Kernel Linux | 
07 Mar 2025, 09:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-07 09:15
Updated : 2025-10-29 21:08
NVD link : CVE-2025-21842
Mitre link : CVE-2025-21842
CVE.ORG link : CVE-2025-21842
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                