Public Date:
1602996: CVE-2018-10906 fuse: bypass of the "user_allow_other" restriction when SELinux is active
A vulnerability was discovered in fuse. When SELinux is active, fusermount is vulnerable to a restriction bypass. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.

Find out more about CVE-2018-10906 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did not affect the versions of fuse as shipped with Red Hat Enterprise Linux 6 as they did not consider escaped characters when checking mount options. This issue is present in fuse packages included with Red Hat Virtualization, however it is not exploitable under any supported configuration.

CVSS v3 metrics

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (fuse) RHSA-2018:3324 2018-10-30

Affected Packages State

Platform Package State
Red Hat Virtualization 4 fuse Will not fix
Red Hat Enterprise Linux 8 fuse Not affected
Red Hat Enterprise Linux 6 fuse Not affected
Last Modified