DEBIAN-CVE-2026-35094

Source
https://security-tracker.debian.org/tracker/CVE-2026-35094
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35094.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-35094
Upstream
  • CVE-2026-35094
Published
2026-04-01T14:16:57.637Z
Modified
2026-04-09T05:00:27.973463Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can exploit a dangling pointer vulnerability. This occurs when a garbage collection cleanup function is called, leaving a pointer that can then be printed to system logs. This could potentially expose sensitive data if the memory location is re-used, leading to information disclosure. For this exploit to work, Lua plugins must be enabled in libinput and loaded by the compositor.

References

Affected packages

Debian:14 / libinput

Package

Name
libinput
Purl
pkg:deb/debian/libinput?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.31.1-1

Affected versions

1.*
1.28.1-1
1.30.0-1
1.30.1-1
1.31.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35094.json"