USN-5326-1

Source
https://ubuntu.com/security/notices/USN-5326-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5326-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-5326-1
Upstream
Related
Published
2022-03-16T22:20:55Z
Modified
2026-05-20T16:05:13.746712330Z
Summary
fuse vulnerability
Details

It was discovered that FUSE is susceptible to a restriction bypass flaw on a system that has SELinux active. A local attacker with non-root privileges could mount a FUSE file system that is accessible to other users and trick them into accessing files on that file system, which could result in a Denial of Service or other unspecified conditions.

References

Affected packages

Ubuntu:Pro:16.04:LTS / fuse

Package

Name
fuse
Purl
pkg:deb/ubuntu/fuse?arch=source&distro=esm-apps%2Fxenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9.4-1ubuntu3.1+esm1

Affected versions

2.*
2.9.4-1ubuntu1
2.9.4-1ubuntu2
2.9.4-1ubuntu3
2.9.4-1ubuntu3.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libfuse2",
            "binary_version": "2.9.4-1ubuntu3.1+esm1"
        },
        {
            "binary_name": "fuse",
            "binary_version": "2.9.4-1ubuntu3.1+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:16.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5326-1.json"