Report: CVE-2026-33150 - Use After Free in libfuse

Report: CVE-2026-33150 - Use After Free in libfuse

CVE ID :CVE-2026-33150 Published : March 20, 2026, 9:17 p.m. | 1 hour, 7 minutes ago Description :libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When io_uring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuse_uring_start() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2. Severity: 7.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
March 20, 2026
Affected Product: Linux
Attack Vector: local