CVE-2026-43111
Received Received - Intake
Use-After-Free in Linux Kernel HID Roccat Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: HID: roccat: fix use-after-free in roccat_report_event roccat_report_event() iterates over the device->readers list without holding the readers_lock. This allows a concurrent roccat_release() to remove and free a reader while it's still being accessed, leading to a use-after-free. Protect the readers list traversal with the readers_lock mutex.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
roccat roccat *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's handling of roccat devices. Specifically, the function roccat_report_event() iterates over a list of device readers without holding the necessary readers_lock mutex. Because of this, another function, roccat_release(), can concurrently remove and free a reader from the list while it is still being accessed. This leads to a use-after-free condition, which is a type of memory error where the system accesses memory that has already been freed.


How can this vulnerability impact me? :

The use-after-free vulnerability can lead to undefined behavior in the Linux kernel, including potential system crashes, data corruption, or exploitation by attackers to execute arbitrary code with kernel privileges. This can compromise system stability and security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart