{"id":"CVE-2022-1215","details":"A format string vulnerability was found in libinput","modified":"2026-04-16T00:08:42.352734865Z","published":"2022-06-02T14:15:32.187Z","related":["ALSA-2022:5257","SUSE-SU-2022:1305-1","openSUSE-SU-2024:12023-1"],"references":[{"type":"ADVISORY","url":"https://seclists.org/oss-sec/2022/q2/47"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202310-14"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q2/47"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/libinput/libinput","events":[{"introduced":"1b21a4317d39786c708b3e7b8cb2db1d870a6a17"},{"fixed":"3850427cd72723f0625d44ead528dd61504fa170"},{"introduced":"ca0c2470d73ccaeaf9cd2557939c8f37c0f3e55a"},{"fixed":"6062273489fb49c6c01946f1c32d0bba0b485b90"}]}],"versions":["1.10.0","1.10.901","1.10.902","1.11.0","1.11.901","1.11.902","1.11.903","1.12.0","1.12.1","1.12.2","1.12.3","1.12.901","1.12.902","1.13.0","1.13.901","1.13.902","1.14.0","1.14.1","1.14.901","1.15.0","1.15.1","1.15.2","1.15.3","1.15.901","1.15.902","1.16.0","1.16.1","1.16.901","1.16.902","1.17.0","1.17.901","1.18.0","1.18.1","1.18.901","1.19.0","1.19.1","1.19.2","1.19.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1215.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}