Source: libinput
Version: 1.31.0-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for libinput.

I make the severity grave to make sure fix go in before forky (I would
expect that anyway), but feel free to downgrade if you do not agree.

CVE-2026-35093[0]:
| A flaw was found in libinput. A local attacker who can place a
| specially crafted Lua bytecode file in certain system or user
| configuration directories can bypass security restrictions. This
| allows the attacker to run unauthorized code with the same
| permissions as the program using libinput, such as a graphical
| compositor. This could lead to the attacker monitoring keyboard
| input and sending that information to an external location.


CVE-2026-35094[1]:
| A flaw was found in libinput. An attacker capable of deploying a Lua
| plugin file in specific system directories can exploit a dangling
| pointer vulnerability. This occurs when a garbage collection cleanup
| function is called, leaving a pointer that can then be printed to
| system logs. This could potentially expose sensitive data if the
| memory location is re-used, leading to information disclosure. For
| this exploit to work, Lua plugins must be enabled in libinput and
| loaded by the compositor.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-35093
    https://www.cve.org/CVERecord?id=CVE-2026-35093
[1] https://security-tracker.debian.org/tracker/CVE-2026-35094
    https://www.cve.org/CVERecord?id=CVE-2026-35094

Regards,
Salvatore

Reply via email to