7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.6%
USN-5382-1 fixed a vulnerability in libinput. This update provides the
corresponding updates for Ubuntu 22.04 LTS.
Original advisory details:
Albin EldstΓ₯l-Ahrens and Lukas Lamster discovered libinput did not properly
handle input devices with specially crafted names. A local attacker with
physical access could use this to cause libinput to crash or expose
sensitive information.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | libinput10 | <Β 1.20.0-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libinput-bin | <Β 1.20.0-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libinput-bin-dbgsym | <Β 1.20.0-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libinput-dev | <Β 1.20.0-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libinput-tools | <Β 1.20.0-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libinput-tools-dbgsym | <Β 1.20.0-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libinput10-dbgsym | <Β 1.20.0-1ubuntu0.1 | UNKNOWN |
7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.6%