May 18, 2023, 1:45 p.m. |

Packet Storm packetstormsecurity.com

Ubuntu Security Notice 6085-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service.

address amd driver graphics i915 information intel kernel linux linux kernel local notice processors return security security notice sensitive information smt ubuntu usn x86

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Cyber Security - Territory Account Manager

@ BlackBerry | London, United Kingdom

Network Security Cisco ISE SME

@ Sopra Steria | Noida, Uttar Pradesh, India

Associate Professional, IAM Security

@ Ingram Micro | Manila Shared Services Center

Senior Risk and Compliance Officer

@ Save the Children International | Egypt

Technical Support Engineer - Security

@ Salesforce | Japan - Tokyo