Home

Description

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: qmi_encdec: Restrict string length in decode The QMI TLV value for strings in a lot of qmi element info structures account for null terminated strings with MAX_LEN + 1. If a string is actually MAX_LEN + 1 length, this will cause an out of bounds access when the NULL character is appended in decoding.

PUBLISHED Reserved 2025-10-22 | Published 2025-10-22 | Updated 2025-10-22 | Assigner Linux

Product status

Default status
unaffected

9b8a11e82615274d4133aab3cf5aa1c59191f0a2 (git) before 6b58859e7c4ac357517a59f0801e8ce1b58a8ee2
affected

9b8a11e82615274d4133aab3cf5aa1c59191f0a2 (git) before 64c5e916fabe5ef7bef0210b8a59fa8941ee1b8e
affected

9b8a11e82615274d4133aab3cf5aa1c59191f0a2 (git) before 2ccab9f82772ead618689d17dbc6950d6bd1e741
affected

9b8a11e82615274d4133aab3cf5aa1c59191f0a2 (git) before b2f39b813d1eed4a522428d1e6acd7dfe9b81579
affected

9b8a11e82615274d4133aab3cf5aa1c59191f0a2 (git) before f6250ecb7fbb934b89539e7e2ba6c1d8555c0975
affected

9b8a11e82615274d4133aab3cf5aa1c59191f0a2 (git) before 22ee7c9c7f381be178b4457bc54530002e08e938
affected

9b8a11e82615274d4133aab3cf5aa1c59191f0a2 (git) before 8d207400fd6b79c92aeb2f33bb79f62dff904ea2
affected

Default status
affected

4.16
affected

Any version before 4.16
unaffected

4.19.295 (semver)
unaffected

5.4.257 (semver)
unaffected

5.10.195 (semver)
unaffected

5.15.132 (semver)
unaffected

6.1.54 (semver)
unaffected

6.5.4 (semver)
unaffected

6.6 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/6b58859e7c4ac357517a59f0801e8ce1b58a8ee2

git.kernel.org/...c/64c5e916fabe5ef7bef0210b8a59fa8941ee1b8e

git.kernel.org/...c/2ccab9f82772ead618689d17dbc6950d6bd1e741

git.kernel.org/...c/b2f39b813d1eed4a522428d1e6acd7dfe9b81579

git.kernel.org/...c/f6250ecb7fbb934b89539e7e2ba6c1d8555c0975

git.kernel.org/...c/22ee7c9c7f381be178b4457bc54530002e08e938

git.kernel.org/...c/8d207400fd6b79c92aeb2f33bb79f62dff904ea2

cve.org (CVE-2023-53729)

nvd.nist.gov (CVE-2023-53729)

Download JSON