CVE-2026-33150

EUVD-2026-13786
libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When io_uring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuse_uring_start() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
GitHub_MCNA
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
libfuse_projectlibfuse
3.18.0 ≤
𝑥
< 3.18.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
fuse3
bookworm
3.14.0-4
fixed
bullseye
3.10.3-2
fixed
forky
3.18.2-1
fixed
sid
3.18.2-1
fixed
trixie
3.17.2-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
fuse
bionic
not-affected
focal
not-affected
jammy
not-affected
noble
not-affected
questing
not-affected
trusty
not-affected
xenial
not-affected
fuse3
focal
not-affected
jammy
not-affected
noble
not-affected
questing
not-affected