{"id":"CVE-2026-33150","summary":"Use After Free in libfuse","details":"libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When io_uring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuse_uring_start() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2.","aliases":["GHSA-qxv7-xrc2-qmfx"],"modified":"2026-04-02T13:41:31.479378Z","published":"2026-03-20T20:20:29.963Z","database_specific":{"cwe_ids":["CWE-416"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33150.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/libfuse/libfuse/releases/tag/fuse-3.18.2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33150.json"},{"type":"ADVISORY","url":"https://github.com/libfuse/libfuse/security/advisories/GHSA-qxv7-xrc2-qmfx"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33150"},{"type":"FIX","url":"https://github.com/libfuse/libfuse/commit/49fcd891a58f622c098e2ca67d66086f7b213836"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libfuse/libfuse","events":[{"introduced":"9157d99f17384f362c65b02cec065e0aec5f0b56"},{"fixed":"033844748010a3b8265bf1c90b9ae8ffe4cd9ca7"}]}],"versions":["fuse-3.18.0","fuse-3.18.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33150.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}