A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can exploit a dangling pointer vulnerability. This occurs when a garbage collection cleanup function is called, leaving a pointer that can then be printed to system logs. This could potentially expose sensitive data if the memory location is re-used, leading to information disclosure. For this exploit to work, Lua plugins must be enabled in libinput and loaded by the compositor.
| Vendor | Product | Versions |
|---|---|---|
| libinput | libinput | — |
Updated vendor and product to 'libinput', changed severity from 'LOW' to 'MEDIUM', and updated CVSS estimate from 3.3 to 4.0.
Initial creation