
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in axboe fio versions up to 3.41, identified as CVE-2025-10823. The vulnerability affects the strbufferpattern_cb function in the options.c file, where a NULL pointer dereference can occur when processing certain configuration options. The issue was discovered and reported on September 11, 2025 (GitHub Issue).
The vulnerability occurs in the strbufferpatterncb function (options.c:1620) where the function calls strlen() on a string value obtained from the jobfile. When a configuration option is provided without a value (e.g., bufferpattern=), the parser passes a NULL pointer into this callback. Since strlen(NULL) is undefined behavior, this leads to a segmentation fault. The issue was discovered using AddressSanitizer (ASan) and UndefinedBehaviorSanitizer (UBSan) on Ubuntu 22.04 with clang 13.0.1 (GitHub Issue).
When exploited, this vulnerability can cause the application to crash due to a segmentation fault when processing certain configuration files. The impact is primarily related to application availability, as the NULL pointer dereference leads to program termination (GitHub Issue).
A simple null check before using strlen() would prevent this issue. As of the report, no official patch has been released, but the issue has been labeled as 'patches welcome' indicating that external contributions for fixing the vulnerability are welcomed (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."