CVE-2025-21842
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/03/2025
Last modified:
29/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
amdkfd: properly free gang_ctx_bo when failed to init user queue<br />
<br />
The destructor of a gtt bo is declared as<br />
void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj);<br />
Which takes void** as the second parameter.<br />
<br />
GCC allows passing void* to the function because void* can be implicitly<br />
casted to any other types, so it can pass compiling.<br />
<br />
However, passing this void* parameter into the function&#39;s<br />
execution process(which expects void** and dereferencing void**)<br />
will result in errors.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



