May 16, 2023, 5:12 p.m. |

Packet Storm packetstormsecurity.com

Ubuntu Security Notice 6080-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service.

address amd driver graphics i915 information intel kernel linux linux kernel local notice processors return security security notice sensitive information smt ubuntu usn x86

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Grp 59 - Cyber System Exploitation CO-OP (July-December, 2024)

@ MIT Lincoln Laboratory | Lexington, MA, US

SecOps Transformation Advisor

@ Palo Alto Networks | Santa Clara, CA, United States

Cybersecurity Editor

@ Launch Potato | Halifax, Canada (remote)

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Senior Security Engineer

@ Splash | Canada (Remote in Eastern or Central time zones)