๐Ÿ” CVE Alert

CVE-2026-43055

UNKNOWN 0.0

scsi: target: file: Use kzalloc_flex for aio_cmd

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: target: file: Use kzalloc_flex for aio_cmd The target_core_file doesn't initialize the aio_cmd->iocb for the ki_write_stream. When a write command fd_execute_rw_aio() is executed, we may get a bogus ki_write_stream value, causing unintended write failure status when checking iocb->ki_write_stream > max_write_streams in the block device. Let's just use kzalloc_flex when allocating the aio_cmd and let ki_write_stream=0 to fix this issue.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
732f25a2895a8c1c54fb56544f0b1e23770ef4d7 < ce54802fe6bb78eb0feffc66fed6a45d41ffc3ab 732f25a2895a8c1c54fb56544f0b1e23770ef4d7 < 4eaff1728d0e69b95933412241bbccf4f797dba8 732f25a2895a8c1c54fb56544f0b1e23770ef4d7 < 01f784fc9d0ab2a6dac45ee443620e517cb2a19b
Linux / Linux
6.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ce54802fe6bb78eb0feffc66fed6a45d41ffc3ab git.kernel.org: https://git.kernel.org/stable/c/4eaff1728d0e69b95933412241bbccf4f797dba8 git.kernel.org: https://git.kernel.org/stable/c/01f784fc9d0ab2a6dac45ee443620e517cb2a19b