| 概要 | In the Linux kernel, the following vulnerability has been resolved: virt: tdx-guest: Fix handling of host controlled 'quote' buffer length Validate host controlled value `quote_buf->out_len` that determines how Catch scenarios where the host specifies a response length larger than This prevents contents beyond the pages allocated for `quote_buf` Recall that some deployments want per-container configs-tsm-report |
|---|---|
| 公表日 | 2026年4月22日23:16 |
| 登録日 | 2026年4月25日4:05 |
| 最終更新日 | 2026年4月24日1:17 |