No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can exploit a dangling pointer vulnerability. This occurs when a garbage collection cleanup function is called, leaving a pointer that can then be printed to system logs. This could potentially expose sensitive data if the memory location is re-used, leading to information disclosure. For this exploit to work, Lua plugins must be enabled in libinput and loaded by the compositor. | |
| Title | Libinput: libinput: information disclosure via dangling pointer in lua plugin handling | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-825 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-01T15:50:07.802Z
Reserved: 2026-04-01T12:56:18.939Z
Link: CVE-2026-35094
Updated: 2026-04-01T15:40:04.659Z
Status : Undergoing Analysis
Published: 2026-04-01T14:16:57.637
Modified: 2026-04-01T14:23:37.727
Link: CVE-2026-35094
OpenCVE Enrichment
Updated: 2026-04-02T20:17:31Z