CVE-2026-33150
Homebrew vulnerability analysis and mitigation

libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When io_uring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuse_uring_start() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2.


SourceNVD

Related Homebrew vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-4154HIGH7.8
  • NixOSNixOS
  • gimp-devel
NoYesApr 11, 2026
CVE-2026-4153HIGH7.8
  • NixOSNixOS
  • gimp:2.8::python2-pycairo
NoYesApr 11, 2026
CVE-2026-4152HIGH7.8
  • NixOSNixOS
  • gimp-devel-tools
NoYesApr 11, 2026
CVE-2026-40386HIGH7.1
  • NixOSNixOS
  • libexif
NoNoApr 12, 2026
CVE-2026-40385HIGH7.1
  • NixOSNixOS
  • libexif
NoNoApr 12, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management