CVE-2026-43111
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
06/05/2026
Last modified:
08/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
HID: roccat: fix use-after-free in roccat_report_event<br />
<br />
roccat_report_event() iterates over the device->readers list without<br />
holding the readers_lock. This allows a concurrent roccat_release() to<br />
remove and free a reader while it&#39;s still being accessed, leading to a<br />
use-after-free.<br />
<br />
Protect the readers list traversal with the readers_lock mutex.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.35 (including) | 6.6.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/36bb2d0b915014bbdc5044982b31b57b78045b93
- https://git.kernel.org/stable/c/bca0b595e15450dd66b1153c76c4ef1087ee011b
- https://git.kernel.org/stable/c/d802d848308b35220f21a8025352f0c0aba15c12
- https://git.kernel.org/stable/c/e16a6d11bd77b81632165f02cf0d5946df74b3b7
- https://git.kernel.org/stable/c/e6a445513fbc6a0329d2d5ff375b6725750ec5a6



