A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can exploit a dangling pointer vulnerability. This occurs when a garbage collection cleanup function is called, leaving a pointer that can then be printed to system logs. This could potentially expose sensitive data if the memory location is re-used, leading to information disclosure. For this exploit to work, Lua plugins must be enabled in libinput and loaded by the compositor.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-35094 | VDB Entry Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2453840 | Issue Tracking Third Party Advisory |
| https://gitlab.freedesktop.org/libinput/libinput/-/work_items/1272 | Broken Link |
Configurations
Configuration 1 (hide)
|
History
07 Apr 2026, 16:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2026-35094 - VDB Entry, Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2453840 - Issue Tracking, Third Party Advisory | |
| References | () https://gitlab.freedesktop.org/libinput/libinput/-/work_items/1272 - Broken Link | |
| First Time |
Fedoraproject fedora
Freedesktop Freedesktop libinput Fedoraproject |
|
| CPE | cpe:2.3:o:fedoraproject:fedora:43:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:libinput:-:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:44:*:*:*:*:*:*:* |
01 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 14:16
Updated : 2026-04-07 16:25
NVD link : CVE-2026-35094
Mitre link : CVE-2026-35094
CVE.ORG link : CVE-2026-35094
JSON object : View
Products Affected
fedoraproject
- fedora
freedesktop
- libinput
CWE
CWE-825
Expired Pointer Dereference
