Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libfuse Project
Libfuse Project libfuse |
|
| CPEs | cpe:2.3:a:libfuse_project:libfuse:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Libfuse Project
Libfuse Project libfuse |
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libfuse
Libfuse libfuse |
|
| Vendors & Products |
Libfuse
Libfuse libfuse |
Fri, 20 Mar 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When io_uring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuse_uring_start() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2. | |
| Title | Use After Free in libfuse | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T18:53:19.720Z
Reserved: 2026-03-17T21:17:08.885Z
Link: CVE-2026-33150
Updated: 2026-03-24T18:52:37.326Z
Status : Analyzed
Published: 2026-03-20T21:17:15.410
Modified: 2026-03-23T19:16:14.717
Link: CVE-2026-33150
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:52:43Z