May 19, 2023, 2:43 p.m. |

Packet Storm packetstormsecurity.com

Ubuntu Security Notice 6090-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service.

address amd driver graphics i915 information intel kernel linux linux kernel local notice processors return security security notice sensitive information smt ubuntu usn x86

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information Security Compliance Manager

@ Bottomline Technologies | North America

Sr. Security Engineer - Data Loss Prevention

@ Verisk | Jersey City, NJ, United States

XM Cyber Solution Consultant

@ ServiceNow | Boston, Massachusetts, United States

Delivery Manager Quality Assurance (software & cyber security)

@ Resillion | Hasselt, Belgium

Security Lead - Air Cargo

@ Adani Group | MUMBAI, MAHARASHTRA, India