Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-35094: Expired Pointer Dereference in Red Hat Red Hat Enterprise Linux 10

0
Low
VulnerabilityCVE-2026-35094cvecve-2026-35094
Published: Wed Apr 01 2026 (04/01/2026, 13:54:00 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can exploit a dangling pointer vulnerability. This occurs when a garbage collection cleanup function is called, leaving a pointer that can then be printed to system logs. This could potentially expose sensitive data if the memory location is re-used, leading to information disclosure. For this exploit to work, Lua plugins must be enabled in libinput and loaded by the compositor.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 14:24:24 UTC

Technical Analysis

CVE-2026-35094 is a vulnerability identified in the libinput library used by Red Hat Enterprise Linux 10. The flaw arises from a dangling pointer dereference triggered during the garbage collection cleanup of Lua plugins loaded by the compositor. Specifically, when a Lua plugin file is deployed in certain system directories and loaded, the garbage collector calls a cleanup function that leaves behind an expired pointer. This pointer may then be printed to system logs, potentially exposing sensitive memory contents if the memory location is reused. Exploitation requires that Lua plugins are enabled in libinput and that the compositor loads these plugins. An attacker must have local privileges sufficient to place a Lua plugin file in the targeted directories, but no user interaction is needed to trigger the vulnerability. The vulnerability impacts confidentiality by potentially leaking sensitive data but does not affect integrity or availability. The CVSS v3.1 base score is 3.3, reflecting low severity due to limited impact and exploitation complexity. No known exploits have been reported in the wild, and no patches are currently linked, though Red Hat is expected to release fixes. This vulnerability highlights risks associated with plugin management and memory handling in system libraries that interface with graphical environments.

Potential Impact

The primary impact of CVE-2026-35094 is potential information disclosure through system logs, which may contain sensitive data from memory locations referenced by the dangling pointer. While the confidentiality impact is limited, exposure of sensitive information could aid attackers in further reconnaissance or privilege escalation. The vulnerability requires local access and the ability to deploy Lua plugins, limiting the attack surface to insiders or attackers who have already compromised a low-privilege account. There is no impact on system integrity or availability, so the threat does not directly cause system disruption or data modification. However, organizations relying on Red Hat Enterprise Linux 10 with enabled Lua plugins in libinput, especially in environments with sensitive graphical sessions, could face increased risk of data leakage. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2026-35094, organizations should first verify if Lua plugin support is enabled in libinput and whether the compositor loads such plugins. If Lua plugins are not required, disabling this feature can eliminate the attack vector. Restrict write permissions on system directories where Lua plugins are loaded to trusted administrators only, preventing unauthorized plugin deployment. Monitor system logs for unusual entries that may indicate exploitation attempts involving expired pointers. Apply patches from Red Hat promptly once they become available. Additionally, implement strict local access controls and auditing to detect and prevent unauthorized file placements. Employ runtime protections such as memory safety tools or hardened garbage collection mechanisms if feasible. Regularly review and update security policies governing plugin management and local privilege assignments to minimize risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-04-01T12:56:18.939Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cd26f5e6bfc5ba1dd45f44

Added to database: 4/1/2026, 2:08:53 PM

Last enriched: 4/1/2026, 2:24:24 PM

Last updated: 4/6/2026, 3:00:37 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses