A flaw was found in libinput. A local attacker who can place a specially crafted Lua bytecode file in certain system or user configuration directories can bypass security restrictions. This allows the attacker to run unauthorized code with the same permissions as the program using libinput, such as a graphical compositor. This could lead to the attacker monitoring keyboard input and sending that information to an external location.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-35093 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2453839 | Issue Tracking Third Party Advisory |
| https://gitlab.freedesktop.org/libinput/libinput/-/work_items/1271 | Broken Link |
Configurations
Configuration 1 (hide)
|
History
07 Apr 2026, 20:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2026-35093 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2453839 - Issue Tracking, Third Party Advisory | |
| References | () https://gitlab.freedesktop.org/libinput/libinput/-/work_items/1271 - Broken Link | |
| First Time |
Fedoraproject fedora
Freedesktop Freedesktop libinput Fedoraproject |
|
| CPE | cpe:2.3:a:freedesktop:libinput:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:43:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:44:*:*:*:*:*:*:* |
01 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 14:16
Updated : 2026-04-07 20:31
NVD link : CVE-2026-35093
Mitre link : CVE-2026-35093
CVE.ORG link : CVE-2026-35093
JSON object : View
Products Affected
fedoraproject
- fedora
freedesktop
- libinput
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
