CVE-2026-43111
HID: roccat: fix use-after-free in roccat_report_event
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: HID: roccat: fix use-after-free in roccat_report_event roccat_report_event() iterates over the device->readers list without holding the readers_lock. This allows a concurrent roccat_release() to remove and free a reader while it's still being accessed, leading to a use-after-free. Protect the readers list traversal with the readers_lock mutex.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | May 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e6a445513fbc6a0329d2d5ff375b6725750ec5a6 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e16a6d11bd77b81632165f02cf0d5946df74b3b7 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 36bb2d0b915014bbdc5044982b31b57b78045b93 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < bca0b595e15450dd66b1153c76c4ef1087ee011b 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d802d848308b35220f21a8025352f0c0aba15c12
Linux / Linux
All versions affected References
git.kernel.org: https://git.kernel.org/stable/c/e6a445513fbc6a0329d2d5ff375b6725750ec5a6 git.kernel.org: https://git.kernel.org/stable/c/e16a6d11bd77b81632165f02cf0d5946df74b3b7 git.kernel.org: https://git.kernel.org/stable/c/36bb2d0b915014bbdc5044982b31b57b78045b93 git.kernel.org: https://git.kernel.org/stable/c/bca0b595e15450dd66b1153c76c4ef1087ee011b git.kernel.org: https://git.kernel.org/stable/c/d802d848308b35220f21a8025352f0c0aba15c12