In the Linux kernel, the following vulnerability has been resolved: ethernet: hisilicon: hns: hnsdsafmisc: fix a possible array overflow in hnsdsafgesrstbyport() The if statement: if (port >= DSAFGENUM) return; limits the value of port less than DSAFGENUM (i.e., 8). However, if the value of port is 6 or 7, an array overflow could occur: portrstoff = dsafdev->maccb[port]->portrstoff; because the length of dsafdev->maccb is DSAFMAXPORTNUM (i.e., 6). To fix this possible array overflow, we first check port and if it is greater than or equal to DSAFMAXPORT_NUM, the function returns.