In the Linux kernel, the following vulnerability has been resolved:
HID: hid-ntrig: fix unable to handle page fault in ntrigreportversion()
in ntrigreportversion(), hdev parameter passed from hidprobe(). sending descriptor to /dev/uhid can make hdev->dev.parent->parent to null if hdev->dev.parent->parent is null, usbdev has invalid address(0xffffffffffffff58) that hidtousbdev(hdev) returned when usbrcvctrlpipe() use usb_dev,it trigger page fault error for address(0xffffffffffffff58)
add null check logic to ntrigreportversion() before calling hidtousb_dev()
[
{
"deprecated": false,
"target": {
"file": "drivers/hid/hid-ntrig.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"197268574358835764296527784350486495888",
"198372149695951116616364016536830038536",
"267486133697585426535806362490098801862"
]
},
"id": "CVE-2025-39808-0edf447b",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22ddb5eca4af5e69dffe2b54551d2487424448f1",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/hid/hid-ntrig.c",
"function": "ntrig_report_version"
},
"digest": {
"length": 571.0,
"function_hash": "71682371487396289657911327381062552573"
},
"id": "CVE-2025-39808-12d26315",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@185c926283da67a72df20a63a5046b3b4631b7d9",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/hid/hid-ntrig.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"197268574358835764296527784350486495888",
"198372149695951116616364016536830038536",
"267486133697585426535806362490098801862"
]
},
"id": "CVE-2025-39808-1b13af13",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@98520a9a3d69a530dd1ee280cbe0abc232a35bff",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/hid/hid-ntrig.c",
"function": "ntrig_report_version"
},
"digest": {
"length": 571.0,
"function_hash": "71682371487396289657911327381062552573"
},
"id": "CVE-2025-39808-6f4510b2",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@98520a9a3d69a530dd1ee280cbe0abc232a35bff",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/hid/hid-ntrig.c",
"function": "ntrig_report_version"
},
"digest": {
"length": 571.0,
"function_hash": "71682371487396289657911327381062552573"
},
"id": "CVE-2025-39808-72be2d33",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22ddb5eca4af5e69dffe2b54551d2487424448f1",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/hid/hid-ntrig.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"197268574358835764296527784350486495888",
"198372149695951116616364016536830038536",
"267486133697585426535806362490098801862"
]
},
"id": "CVE-2025-39808-9e08b8ae",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@019c34ca11372de891c06644846eb41fca7c890c",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/hid/hid-ntrig.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"197268574358835764296527784350486495888",
"198372149695951116616364016536830038536",
"267486133697585426535806362490098801862"
]
},
"id": "CVE-2025-39808-b45e040f",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@185c926283da67a72df20a63a5046b3b4631b7d9",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "drivers/hid/hid-ntrig.c",
"function": "ntrig_report_version"
},
"digest": {
"length": 571.0,
"function_hash": "71682371487396289657911327381062552573"
},
"id": "CVE-2025-39808-def6177e",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@019c34ca11372de891c06644846eb41fca7c890c",
"signature_version": "v1"
}
]