libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When io_uring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuse_uring_start() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2.
References
| Link | Resource |
|---|---|
| https://github.com/libfuse/libfuse/commit/49fcd891a58f622c098e2ca67d66086f7b213836 | Patch |
| https://github.com/libfuse/libfuse/releases/tag/fuse-3.18.2 | Product Release Notes |
| https://github.com/libfuse/libfuse/security/advisories/GHSA-qxv7-xrc2-qmfx | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 21:17
Updated : 2026-03-23 19:16
NVD link : CVE-2026-33150
Mitre link : CVE-2026-33150
CVE.ORG link : CVE-2026-33150
JSON object : View
Products Affected
libfuse_project
- libfuse
CWE
CWE-416
Use After Free
