| Summary | In the Linux kernel, the following vulnerability has been resolved: virt: tdx-guest: Fix handling of host controlled 'quote' buffer length Validate host controlled value `quote_buf->out_len` that determines how Catch scenarios where the host specifies a response length larger than This prevents contents beyond the pages allocated for `quote_buf` Recall that some deployments want per-container configs-tsm-report |
|---|---|
| Publication Date | April 22, 2026, 11:16 p.m. |
| Registration Date | April 25, 2026, 4:05 a.m. |
| Last Update | April 24, 2026, 1:17 a.m. |