CVE-2025-71112

medium

Description

In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause out-of-bounds memory access once the VLAN id is bigger than or equal to VLAN_N_VID. Therefore, VLAN id needs to be checked to ensure it is within the range of VLAN_N_VID.

References

https://git.kernel.org/stable/c/b7b4f3bf118f51b67691a55b464f04452e5dc6fc

https://git.kernel.org/stable/c/95cca255a7a5ad782639ff0298c2a486707d1046

https://git.kernel.org/stable/c/91a51d01be5c9f82c12c2921ca5cceaa31b67128

https://git.kernel.org/stable/c/6ef935e65902bfed53980ad2754b06a284ea8ac1

https://git.kernel.org/stable/c/00e56a7706e10b3d00a258d81fcb85a7e96372d6

Details

Source: Mitre, NVD

Published: 2026-01-14

Updated: 2026-01-14

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018