User-After-Free Vulnerability in ASUS HID Devices from Linux Kernel
CVE-2025-39824

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
16 September 2025

What is CVE-2025-39824?

A user-after-free vulnerability exists in ASUS HID devices managed by the Linux kernel. This flaw allows a malicious HID device, such as a specially crafted ASUS ROG N-Key keyboard, to exploit the system. The vulnerability arises when the hid_hw_start() function inappropriately processes the device descriptors, potentially bypassing capability bitmap configurations. This leads to improper handling of memory, allowing the attacker to manipulate the freed memory space, resulting in possible data corruption or arbitrary code execution. These factors highlight the critical need for robust validation and error management in HID device connectivity.

Affected Version(s)

Linux 9ce12d8be12c94334634dd57050444910415e45f < 9a9e4a8317437bf944fa017c66e1e23a0368b5c7

Linux 9ce12d8be12c94334634dd57050444910415e45f < 7170122e2ae4ab378c9cdf7cc54dea8b0abbbca5

Linux 9ce12d8be12c94334634dd57050444910415e45f

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-39824 : User-After-Free Vulnerability in ASUS HID Devices from Linux Kernel