May 16, 2023, 5:11 p.m. |

Packet Storm packetstormsecurity.com

Ubuntu Security Notice 6079-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service.

address amd driver drm gpu information kernel linux linux kernel local notice out-of-bounds processors return security security notice sensitive information smt ubuntu usn virtual vmware x86

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

IT Security Associate

@ EcoVadis | Barcelona, Spain

Cyber Security w/ Clearance - Alabama

@ Rothe | Huntsville, AL, United States

Manager - Cyber Security

@ Adani Group | AHMEDABAD, GUJARAT, India

Security Architect

@ Wix | Tel Aviv-Yafo, Israel

Technical Support Engineer - Cyber Security

@ Microsoft | Taipei, Taipei City, Taiwan