Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0694

NIXPKGS-2026-0694
published on
Permalink CVE-2026-33150
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package haskellPackages.libfuse3
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Use After Free in libfuse

libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When io_uring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuse_uring_start() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2.

Affected products

libfuse
  • ==>= 3.18.0, < 3.18.2
Upstream advisory: https://github.com/libfuse/libfuse/security/advisories/GHSA-qxv7-xrc2-qmfx
Patch: https://github.com/libfuse/libfuse/commit/49fcd891a58f622c098e2ca67d66086f7b213836