
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a KASAN (Kernel Address Sanitizer) warning was discovered in raid10_remove_disk function when running the lvm test lvconvert-raid-reshape.sh. The vulnerability was identified and disclosed in June 2025 (NVD).
The vulnerability manifests as a slab-out-of-bounds read of size 8 at a specific memory address. The issue occurs in the raid10_remove_disk function when the value 'number' is not properly validated before use. The bug was detected during the execution of the lvm test lvconvert-raid-reshape.sh and triggers a KASAN warning (NVD).
The vulnerability could potentially lead to a read of memory outside the allocated bounds in the Linux kernel's RAID10 implementation, which may result in information disclosure or system stability issues (NVD).
The vulnerability has been resolved by adding proper validation of the 'number' value before its use in the raid10_remove_disk function. This fix ensures that the value is valid before performing memory operations (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."