In the Linux kernel, the following vulnerability has been resolved:
HID: hid-ntrig: fix unable to handle page fault in ntrigreportversion()
in ntrigreportversion(), hdev parameter passed from hidprobe(). sending descriptor to /dev/uhid can make hdev->dev.parent->parent to null if hdev->dev.parent->parent is null, usbdev has invalid address(0xffffffffffffff58) that hidtousbdev(hdev) returned when usbrcvctrlpipe() use usb_dev,it trigger page fault error for address(0xffffffffffffff58)
add null check logic to ntrigreportversion() before calling hidtousb_dev()
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"197268574358835764296527784350486495888",
"198372149695951116616364016536830038536",
"267486133697585426535806362490098801862"
]
},
"target": {
"file": "drivers/hid/hid-ntrig.c"
},
"signature_version": "v1",
"id": "CVE-2025-39808-0edf447b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22ddb5eca4af5e69dffe2b54551d2487424448f1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "71682371487396289657911327381062552573",
"length": 571.0
},
"target": {
"file": "drivers/hid/hid-ntrig.c",
"function": "ntrig_report_version"
},
"signature_version": "v1",
"id": "CVE-2025-39808-12d26315",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@185c926283da67a72df20a63a5046b3b4631b7d9"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"197268574358835764296527784350486495888",
"198372149695951116616364016536830038536",
"267486133697585426535806362490098801862"
]
},
"target": {
"file": "drivers/hid/hid-ntrig.c"
},
"signature_version": "v1",
"id": "CVE-2025-39808-17218159",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@183def8e4d786e50165e5d992df6a3083e45e16c"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "71682371487396289657911327381062552573",
"length": 571.0
},
"target": {
"file": "drivers/hid/hid-ntrig.c",
"function": "ntrig_report_version"
},
"signature_version": "v1",
"id": "CVE-2025-39808-31329b5a",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4338b0f6544c3ff042bfbaf40bc9afe531fb08c7"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "71682371487396289657911327381062552573",
"length": 571.0
},
"target": {
"file": "drivers/hid/hid-ntrig.c",
"function": "ntrig_report_version"
},
"signature_version": "v1",
"id": "CVE-2025-39808-72be2d33",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22ddb5eca4af5e69dffe2b54551d2487424448f1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"197268574358835764296527784350486495888",
"198372149695951116616364016536830038536",
"267486133697585426535806362490098801862"
]
},
"target": {
"file": "drivers/hid/hid-ntrig.c"
},
"signature_version": "v1",
"id": "CVE-2025-39808-b45e040f",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@185c926283da67a72df20a63a5046b3b4631b7d9"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "71682371487396289657911327381062552573",
"length": 571.0
},
"target": {
"file": "drivers/hid/hid-ntrig.c",
"function": "ntrig_report_version"
},
"signature_version": "v1",
"id": "CVE-2025-39808-c87e3f03",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@183def8e4d786e50165e5d992df6a3083e45e16c"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"197268574358835764296527784350486495888",
"198372149695951116616364016536830038536",
"267486133697585426535806362490098801862"
]
},
"target": {
"file": "drivers/hid/hid-ntrig.c"
},
"signature_version": "v1",
"id": "CVE-2025-39808-eac3a946",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4338b0f6544c3ff042bfbaf40bc9afe531fb08c7"
}
]