May 19, 2023, 2:52 p.m. |

Packet Storm packetstormsecurity.com

Ubuntu Security Notice 6091-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service.

address amd driver drm gpu information kernel linux linux kernel local notice out-of-bounds processors return security security notice sensitive information smt ubuntu usn virtual vmware x86

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Manager - Vendor management/ Compliance

@ Sprinklr | India - Haryana - Gurgaon

DevSecOps Engineer

@ Swiss Re | Hyderabad, TG, IN

Cyber Security Architect

@ Endeavour Group | Surry Hills, Australia

Principal Product Manager (Network/Security Management) - NetSec

@ Palo Alto Networks | Bengaluru, India

Lead Security Analyst

@ Deloitte | Sydney, NSW, AU