{"id":"CVE-2025-71064","summary":"net: hns3: using the num_tqps in the vf driver to apply for resources","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: using the num_tqps in the vf driver to apply for resources\n\nCurrently, hdev-\u003ehtqp is allocated using hdev-\u003enum_tqps, and kinfo-\u003etqp\nis allocated using kinfo-\u003enum_tqps. However, kinfo-\u003enum_tqps is set to\nmin(new_tqps, hdev-\u003enum_tqps);  Therefore, kinfo-\u003enum_tqps may be smaller\nthan hdev-\u003enum_tqps, which causes some hdev-\u003ehtqp[i] to remain\nuninitialized in hclgevf_knic_setup().\n\nThus, this patch allocates hdev-\u003ehtqp and kinfo-\u003etqp using hdev-\u003enum_tqps,\nensuring that the lengths of hdev-\u003ehtqp and kinfo-\u003etqp are consistent\nand that all elements are properly initialized.","modified":"2026-04-02T13:04:38.245283Z","published":"2026-01-13T15:31:20.503Z","related":["MGASA-2026-0017","MGASA-2026-0018","SUSE-SU-2026:0447-1","SUSE-SU-2026:0472-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:0587-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20287-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71064.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1956d47a03eb625951e9e070db39fe2590e27510"},{"type":"WEB","url":"https://git.kernel.org/stable/c/429f946a7af3fbf08761d218746cd4afa80a7954"},{"type":"WEB","url":"https://git.kernel.org/stable/c/62f28d79a6186a602a9d926a2dbb5b12b6867df7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6cd8a2930df850f4600fe8c57d0662b376520281"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bcefdb288eedac96fd2f583298927e9c6c481489"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c149decd8c18ae6acdd7a6041d74507835cf26e6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c2a16269742e176fccdd0ef9c016a233491a49ad"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71064.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71064"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e2cb1dec9779ba2d89302a653eb0abaeb8682196"},{"fixed":"c149decd8c18ae6acdd7a6041d74507835cf26e6"},{"fixed":"bcefdb288eedac96fd2f583298927e9c6c481489"},{"fixed":"6cd8a2930df850f4600fe8c57d0662b376520281"},{"fixed":"1956d47a03eb625951e9e070db39fe2590e27510"},{"fixed":"429f946a7af3fbf08761d218746cd4afa80a7954"},{"fixed":"62f28d79a6186a602a9d926a2dbb5b12b6867df7"},{"fixed":"c2a16269742e176fccdd0ef9c016a233491a49ad"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71064.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.16.0"},{"fixed":"5.10.248"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.64"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71064.json"}}],"schema_version":"1.7.5"}