Unrated severityNVD Advisory· Published Jan 14, 2026· Updated Feb 9, 2026
net: hns3: add VLAN id validation before using
CVE-2025-71112
Description
In the Linux kernel, the following vulnerability has been resolved:
net: hns3: add VLAN id validation before using
Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause out-of-bounds memory access once the VLAN id is bigger than or equal to VLAN_N_VID.
Therefore, VLAN id needs to be checked to ensure it is within the range of VLAN_N_VID.
Affected products
2- Linux/Linuxv5Range: 5.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/00e56a7706e10b3d00a258d81fcb85a7e96372d6mitre
- git.kernel.org/stable/c/42c91dfa772c57de141e5a55a187ac760c0fd7e1mitre
- git.kernel.org/stable/c/46c7d9fe8dd869ea5de666aba8c1ec1061ca44a8mitre
- git.kernel.org/stable/c/6ef935e65902bfed53980ad2754b06a284ea8ac1mitre
- git.kernel.org/stable/c/91a51d01be5c9f82c12c2921ca5cceaa31b67128mitre
- git.kernel.org/stable/c/95cca255a7a5ad782639ff0298c2a486707d1046mitre
- git.kernel.org/stable/c/b7b4f3bf118f51b67691a55b464f04452e5dc6fcmitre
News mentions
0No linked articles in our index yet.