CVE-2025-39808
📋 TL;DR
A null pointer dereference vulnerability in the Linux kernel's HID ntrig driver allows local attackers to trigger a kernel page fault by sending crafted descriptors to /dev/uhid. This affects Linux systems with the hid-ntrig driver loaded, potentially causing denial of service. The vulnerability requires local access to the system.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local denial of service causing kernel panic or system crash, requiring physical or remote console access to recover.
Likely Case
Local denial of service affecting the HID subsystem, potentially disrupting input devices until system restart.
If Mitigated
Minimal impact with proper access controls preventing unauthorized local users from accessing /dev/uhid.
🎯 Exploit Status
Exploitation requires local access and ability to write to /dev/uhid. No authentication bypass needed beyond local access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in stable kernel versions via commits referenced in CVE
Vendor Advisory: https://git.kernel.org/stable/c/019c34ca11372de891c06644846eb41fca7c890c
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify hid-ntrig module loads without errors.
🔧 Temporary Workarounds
Disable hid-ntrig module
LinuxPrevent loading of vulnerable driver if N-trig devices are not needed
echo 'blacklist hid-ntrig' >> /etc/modprobe.d/blacklist.conf
rmmod hid-ntrig
Restrict /dev/uhid access
LinuxLimit access to the vulnerable interface to prevent exploitation
chmod 600 /dev/uhid
chown root:root /dev/uhid
🧯 If You Can't Patch
- Implement strict access controls on /dev/uhid device file
- Monitor system logs for kernel panic or page fault errors related to hid-ntrig
🔍 How to Verify
Check if Vulnerable:
Check if hid-ntrig module is loaded: lsmod | grep hid_ntrig
Check Version:
uname -r
Verify Fix Applied:
Check kernel version is patched: uname -r and verify against distribution security advisories
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- Page fault errors mentioning hid_ntrig or ntrig_report_version
- System crash/reboot logs
Network Indicators:
- None - local exploitation only
SIEM Query:
source="kernel" AND ("page fault" OR "kernel panic") AND ("hid_ntrig" OR "ntrig")
🔗 References
- https://git.kernel.org/stable/c/019c34ca11372de891c06644846eb41fca7c890c
- https://git.kernel.org/stable/c/183def8e4d786e50165e5d992df6a3083e45e16c
- https://git.kernel.org/stable/c/185c926283da67a72df20a63a5046b3b4631b7d9
- https://git.kernel.org/stable/c/22ddb5eca4af5e69dffe2b54551d2487424448f1
- https://git.kernel.org/stable/c/4338b0f6544c3ff042bfbaf40bc9afe531fb08c7
- https://git.kernel.org/stable/c/6070123d5344d0950f10ef6a5fdc3f076abb7ad2
- https://git.kernel.org/stable/c/98520a9a3d69a530dd1ee280cbe0abc232a35bff
- https://git.kernel.org/stable/c/e422370e6ab28478872b914cee5d49a9bdfae0c6
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html