Libinput Vulnerability in Configuration Directories Exposes User Permissions
CVE-2026-35093
8.8HIGH
What is CVE-2026-35093?
A vulnerability in libinput allows local attackers to exploit specially crafted Lua bytecode files placed in system or user configuration directories. By doing so, they can bypass essential security restrictions, enabling the execution of unauthorized code with the same privileges as the process utilizing libinput. This presents significant risks, including the potential to monitor keystrokes and exfiltrate sensitive information to external locations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Koen Tange (monokles.eu) for reporting this issue.