Impact
This vulnerability in the Linux kernel’s TDX guest interface allows a host to supply a quote buffer length that exceeds the space allocated for a guest. The kernel incorrectly copies the entire host-specified length into guest user space, enabling an attacker to read data beyond the allocated pages. The leaked data could contain sensitive host or kernel information and may be forwarded to an external attestation server or read by an unprivileged process, resulting in information disclosure and potential cross‑container data leaks.
Affected Systems
The flaw affects Linux kernel implementations that support Intel TDX guest environments. Any distribution built on the Linux kernel with TDX support is potentially impacted; the specific kernel versions are not listed in the advisory and should be identified by checking for the presence of the patch in the kernel tree.
Risk and Exploitability
No CVSS or EPSS score is provided in the advisory, and the vulnerability is not listed in the CISA KEV catalog. Because the flaw enables out‑of‑bounds reads of host‑controlled data, it carries a high risk of information disclosure, especially in multi‑container environments where the content can cross protection boundaries. The lack of published metrics does not imply low risk; the attack vector requires a host that can control the quote buffer size, which is typically only possible by a privileged actor controlling the virtualization environment.
OpenCVE Enrichment