
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability has been identified in the QMI TLV (Type-Length-Value) string handling within the soc: qcom: qmiencdec component. The vulnerability was disclosed on October 22, 2025, affecting Linux kernel systems. The issue occurs when handling strings in QMI element info structures that account for null-terminated strings with MAXLEN + 1 (NVD).
The vulnerability stems from a string length handling issue in the QMI encoder/decoder component. When a string's length equals MAX_LEN + 1, an out-of-bounds access occurs during the decoding process when attempting to append the NULL character. This technical limitation in the string length restriction mechanism could lead to memory corruption (NVD).
The vulnerability could allow an authorized attacker to elevate privileges locally on affected Linux systems. The out-of-bounds access during string decoding could potentially lead to memory corruption, affecting system stability and security (Microsoft Learn).
The vulnerability has been resolved through a patch that restricts string length in the decode function. Multiple Linux kernel versions have received security updates to address this issue. System administrators are advised to apply the latest kernel security updates that include the fix (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."