CVE-2026-43111
Use-After-Free in Linux Kernel HID Roccat Driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| roccat | roccat | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's handling of roccat devices. Specifically, the function roccat_report_event() iterates over a list of device readers without holding the necessary readers_lock mutex. Because of this, another function, roccat_release(), can concurrently remove and free a reader from the list while it is still being accessed. This leads to a use-after-free condition, which is a type of memory error where the system accesses memory that has already been freed.
How can this vulnerability impact me? :
The use-after-free vulnerability can lead to undefined behavior in the Linux kernel, including potential system crashes, data corruption, or exploitation by attackers to execute arbitrary code with kernel privileges. This can compromise system stability and security.