{"uuid": "ed3eb197-a951-4688-a44b-19c5b5f04375", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21842", "type": "seen", "source": "https://t.me/cvedetector/19808", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21842 - AMD KFD Use-After-Free Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-21842 \nPublished : March 7, 2025, 9:15 a.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \namdkfd: properly free gang_ctx_bo when failed to init user queue  \n  \nThe destructor of a gtt bo is declared as  \nvoid amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj);  \nWhich takes void** as the second parameter.  \n  \nGCC allows passing void* to the function because void* can be implicitly  \ncasted to any other types, so it can pass compiling.  \n  \nHowever, passing this void* parameter into the function's  \nexecution process(which expects void** and dereferencing void**)  \nwill result in errors. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T12:25:47.000000Z"}