CVE-2025-71112
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/01/2026
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: hns3: add VLAN id validation before using<br />
<br />
Currently, the VLAN id may be used without validation when<br />
receive a VLAN configuration mailbox from VF. The length of<br />
vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause<br />
out-of-bounds memory access once the VLAN id is bigger than<br />
or equal to VLAN_N_VID.<br />
<br />
Therefore, VLAN id needs to be checked to ensure it is within<br />
the range of VLAN_N_VID.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/00e56a7706e10b3d00a258d81fcb85a7e96372d6
- https://git.kernel.org/stable/c/6ef935e65902bfed53980ad2754b06a284ea8ac1
- https://git.kernel.org/stable/c/91a51d01be5c9f82c12c2921ca5cceaa31b67128
- https://git.kernel.org/stable/c/95cca255a7a5ad782639ff0298c2a486707d1046
- https://git.kernel.org/stable/c/b7b4f3bf118f51b67691a55b464f04452e5dc6fc



