CVE-2025-71112

HIGH

Linux kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause out-of-bounds memory access once the VLAN id is bigger than or equal to VLAN_N_VID. Therefore, VLAN id needs to be checked to ensure it is within the range of VLAN_N_VID.

Scores

CVSS v3 7.1
EPSS 0.0002
EPSS Percentile 4.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Details

CWE
CWE-125
Status published
Products (25)
linux/Kernel 5.11.0 - 5.15.198linux
linux/Kernel 5.16.0 - 6.1.160linux
linux/Kernel 5.3.0 - 5.10.248linux
linux/Kernel 6.13.0 - 6.18.3linux
linux/Kernel 6.2.0 - 6.6.120linux
linux/Kernel 6.7.0 - 6.12.64linux
Linux/Linux < 5.3
Linux/Linux 5.10.248 - 5.10.*
Linux/Linux 5.15.198 - 5.15.*
Linux/Linux 5.3
... and 15 more
Published Jan 14, 2026
Tracked Since Feb 18, 2026