In the Linux kernel, the following vulnerability has been resolved:
amdkfd: properly free gang_ctx_bo when failed to init user queue
The destructor of a gtt bo is declared as
void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj);
Which takes void** as the second parameter.
GCC allows passing void* to the function because void* can be implicitly
casted to any other types, so it can pass compiling.
However, passing this void* parameter into the function's
execution process(which expects void** and dereferencing void**)
will result in errors.
Metrics
Affected Vendors & Products
References
History
Wed, 26 Mar 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-99 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 08 Mar 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 07 Mar 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: amdkfd: properly free gang_ctx_bo when failed to init user queue The destructor of a gtt bo is declared as void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj); Which takes void** as the second parameter. GCC allows passing void* to the function because void* can be implicitly casted to any other types, so it can pass compiling. However, passing this void* parameter into the function's execution process(which expects void** and dereferencing void**) will result in errors. | |
Title | amdkfd: properly free gang_ctx_bo when failed to init user queue | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-03-24T15:41:14.438Z
Reserved: 2024-12-29T08:45:45.777Z
Link: CVE-2025-21842

No data.

Status : Received
Published: 2025-03-07T09:15:17.237
Modified: 2025-03-07T09:15:17.237
Link: CVE-2025-21842
