Libinput Vulnerability in Configuration Directories Exposes User Permissions
CVE-2026-35093
8.8HIGH
What is CVE-2026-35093?
A vulnerability in libinput allows local attackers to exploit specially crafted Lua bytecode files placed in system or user configuration directories. By doing so, they can bypass essential security restrictions, enabling the execution of unauthorized code with the same privileges as the process utilizing libinput. This presents significant risks, including the potential to monitor keystrokes and exfiltrate sensitive information to external locations.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Koen Tange (monokles.eu) for reporting this issue.