Description
In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause out-of-bounds memory access once the VLAN id is bigger than or equal to VLAN_N_VID. Therefore, VLAN id needs to be checked to ensure it is within the range of VLAN_N_VID.
References (7)
Core 7
Core References
Scores
CVSS v3
7.1
EPSS
0.0002
EPSS Percentile
4.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (25)
linux/Kernel
5.11.0 - 5.15.198linux
linux/Kernel
5.16.0 - 6.1.160linux
linux/Kernel
5.3.0 - 5.10.248linux
linux/Kernel
6.13.0 - 6.18.3linux
linux/Kernel
6.2.0 - 6.6.120linux
linux/Kernel
6.7.0 - 6.12.64linux
Linux/Linux
< 5.3
Linux/Linux
5.10.248 - 5.10.*
Linux/Linux
5.15.198 - 5.15.*
Linux/Linux
5.3
... and 15 more
Published
Jan 14, 2026
Tracked Since
Feb 18, 2026