CVE-2026-35093

A flaw was found in libinput. A local attacker who can place a specially crafted Lua bytecode file in certain system or user configuration directories can bypass security restrictions. This allows the attacker to run unauthorized code with the same permissions as the program using libinput, such as a graphical compositor. This could lead to the attacker monitoring keyboard input and sending that information to an external location.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freedesktop:libinput:*:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:libinput:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:43:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:44:*:*:*:*:*:*:*

History

07 Apr 2026, 20:31

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2026-35093 - () https://access.redhat.com/security/cve/CVE-2026-35093 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2453839 - () https://bugzilla.redhat.com/show_bug.cgi?id=2453839 - Issue Tracking, Third Party Advisory
References () https://gitlab.freedesktop.org/libinput/libinput/-/work_items/1271 - () https://gitlab.freedesktop.org/libinput/libinput/-/work_items/1271 - Broken Link
First Time Fedoraproject fedora
Freedesktop
Freedesktop libinput
Fedoraproject
CPE cpe:2.3:a:freedesktop:libinput:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:43:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:44:*:*:*:*:*:*:*

01 Apr 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 14:16

Updated : 2026-04-07 20:31


NVD link : CVE-2026-35093

Mitre link : CVE-2026-35093

CVE.ORG link : CVE-2026-35093


JSON object : View

Products Affected

fedoraproject

  • fedora

freedesktop

  • libinput
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')