CVE-2026-33150

Source
https://cve.org/CVERecord?id=CVE-2026-33150
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33150.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-33150
Aliases
  • GHSA-qxv7-xrc2-qmfx
Downstream
Published
2026-03-20T20:20:29.963Z
Modified
2026-04-02T13:41:31.479378Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Use After Free in libfuse
Details

libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the iouring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When iouring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuseuringstart() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33150.json",
    "cwe_ids": [
        "CWE-416"
    ]
}
References

Affected packages

Git / github.com/libfuse/libfuse

Affected ranges

Type
GIT
Repo
https://github.com/libfuse/libfuse
Events

Affected versions

fuse-3.*
fuse-3.18.0
fuse-3.18.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33150.json"