CVE-2025-39824Use After Free in Linux

CWE-416Use After Free25 documents8 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 96.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16
Latest updateApr 9

Description

In the Linux kernel, the following vulnerability has been resolved: HID: asus: fix UAF via HID_CLAIMED_INPUT validation After hid_hw_start() is called hidinput_connect() will eventually be called to set up the device with the input layer since the HID_CONNECT_DEFAULT connect mask is used. During hidinput_connect() all input and output reports are processed and corresponding hid_inputs are allocated and configured via hidinput_configure_usages(). This process involves slot tagging report fields

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDlinux/linux_kernel4.105.4.298+7
Debianlinux/linux_kernel< 5.10.244-1+3
CVEListV5linux/linux9ce12d8be12c94334634dd57050444910415e45f9a9e4a8317437bf944fa017c66e1e23a0368b5c7+8

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

3
OSV
CVE-2025-39824: In the Linux kernel, the following vulnerability has been resolved: HID: asus: fix UAF via HID_CLAIMED_INPUT validation After hid_hw_start() is called2025-09-16
CVEList
HID: asus: fix UAF via HID_CLAIMED_INPUT validation2025-09-16
GHSA
GHSA-v45v-87mp-6qrc: In the Linux kernel, the following vulnerability has been resolved: HID: asus: fix UAF via HID_CLAIMED_INPUT validation After hid_hw_start() is call2025-09-16

📋Vendor Advisories

21
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-04-09
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2026-04-01
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-25
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-25
Ubuntu
Linux kernel (AWS) vulnerabilities2026-03-23
CVE-2025-39824 — Use After Free in Linux | cvebase