CVE-2026-43111

high

Description

In the Linux kernel, the following vulnerability has been resolved: HID: roccat: fix use-after-free in roccat_report_event roccat_report_event() iterates over the device->readers list without holding the readers_lock. This allows a concurrent roccat_release() to remove and free a reader while it's still being accessed, leading to a use-after-free. Protect the readers list traversal with the readers_lock mutex.

References

https://git.kernel.org/stable/c/e6a445513fbc6a0329d2d5ff375b6725750ec5a6

https://git.kernel.org/stable/c/e16a6d11bd77b81632165f02cf0d5946df74b3b7

https://git.kernel.org/stable/c/d802d848308b35220f21a8025352f0c0aba15c12

https://git.kernel.org/stable/c/bca0b595e15450dd66b1153c76c4ef1087ee011b

https://git.kernel.org/stable/c/36bb2d0b915014bbdc5044982b31b57b78045b93

Details

Source: Mitre, NVD

Published: 2026-05-06

Updated: 2026-05-06

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018