Description
A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3.41 when parsing job files containing the fdp_pli option. The callback function str_fdp_pli_cb() does not validate the input pointer and calls strdup() on a NULL value when the option is specified without an argument. This results in a segmentation fault and process crash.
Published: 2026-04-16
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Process crash via NULL pointer dereference leading to local denial of service
Action: Update immediately
AI Analysis

Impact

fio (Flexible I/O Tester) version 3.41 has a flaw in the job file parser where the fdp_pli option is invoked without an argument. The callback function for this option performs a string duplication on a NULL value, resulting in a segmentation fault that terminates the process. This vulnerability allows an attacker who can supply a malformed job file to force fio to crash, disrupting any instance where it is being used for benchmarking or testing. The weakness is a classic null pointer dereference, a type of bug that typically leads to denial of service rather than code execution.

Affected Systems

The affected product is fio Flexible I/O Tester v3.41 as disclosed. No other versions are listed in the advisory, so the impact is limited to installations of this exact version unless the same code path remains unchanged in later releases.

Risk and Exploitability

No EPSS score and no CISA KEV listing are available, implying that no public exploitation has been observed or catalogued. The likely attack vector is manual or automated input of a job file that contains the fdp_pli option without an argument; an attacker with the ability to influence job inputs can trigger the crash. Because the vulnerability causes a segmentation fault, exploitation is limited to denial of service. However, in environments where fio is run with elevated privileges or where a crash could lead to broader system instability, the risk is elevated. With a CVSS score of 7.5, the vulnerability is considered high severity and warrants immediate patching, yet it remains a local vulnerability requiring privileged or local access to craft the malicious job file.

Generated by OpenCVE AI on April 17, 2026 at 06:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade fio to a version that resolves the null pointer dereference in the fdp_pli option; the fix is available in releases newer than 3.41.
  • If an upgrade is not currently available, remove the fdp_pli option from job files or supply a valid argument for the option to prevent the internal call to strdup from operating on a NULL pointer.
  • Configure monitoring or watchdog scripts to detect fio crashes promptly and automatically restart the process to maintain testing continuity.

Generated by OpenCVE AI on April 17, 2026 at 06:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title fio: fio: Denial of Service via NULL pointer dereference when parsing job files
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 16 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Axboe
Axboe fio
Vendors & Products Axboe
Axboe fio

Thu, 16 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3.41 when parsing job files containing the fdp_pli option. The callback function str_fdp_pli_cb() does not validate the input pointer and calls strdup() on a NULL value when the option is specified without an argument. This results in a segmentation fault and process crash.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-16T17:33:52.962Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30656

cve-icon Vulnrichment

Updated: 2026-04-16T17:33:49.185Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-16T15:17:17.873

Modified: 2026-04-17T15:38:09.243

Link: CVE-2026-30656

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-16T00:00:00Z

Links: CVE-2026-30656 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T06:30:11Z

Weaknesses