SB2025102337 - Out-of-bounds read in Linux kernel soc qcom driver
Published: October 23, 2025 Updated: October 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2023-53729)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the qmi_decode_string_elem() function in drivers/soc/qcom/qmi_encdec.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/22ee7c9c7f381be178b4457bc54530002e08e938
- https://git.kernel.org/stable/c/2ccab9f82772ead618689d17dbc6950d6bd1e741
- https://git.kernel.org/stable/c/64c5e916fabe5ef7bef0210b8a59fa8941ee1b8e
- https://git.kernel.org/stable/c/6b58859e7c4ac357517a59f0801e8ce1b58a8ee2
- https://git.kernel.org/stable/c/8d207400fd6b79c92aeb2f33bb79f62dff904ea2
- https://git.kernel.org/stable/c/b2f39b813d1eed4a522428d1e6acd7dfe9b81579
- https://git.kernel.org/stable/c/f6250ecb7fbb934b89539e7e2ba6c1d8555c0975
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.54