Untriaged
Permalink
CVE-2026-33150
7.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Use After Free in libfuse
libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When io_uring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuse_uring_start() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2.
References
- https://github.com/libfuse/libfuse/security/advisories/GHSA-qxv7-xrc2-qmfx x_refsource_CONFIRM
- https://github.com/libfuse/libfuse/commit/49fcd891a58f622c098e2ca67d66086f7b213836 x_refsource_MISC
- https://github.com/libfuse/libfuse/releases/tag/fuse-3.18.2 x_refsource_MISC
Affected products
libfuse
- ==>= 3.18.0, < 3.18.2