May 23, 2023, 1:54 p.m. |

Packet Storm packetstormsecurity.com

Ubuntu Security Notice 6096-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service.

address amd driver drm gpu information kernel linux linux kernel local notice out-of-bounds processors return security security notice sensitive information smt ubuntu usn virtual vmware x86

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information Security Compliance Manager

@ Bottomline Technologies | North America

Sr. Security Engineer - Data Loss Prevention

@ Verisk | Jersey City, NJ, United States

XM Cyber Solution Consultant

@ ServiceNow | Boston, Massachusetts, United States

Delivery Manager Quality Assurance (software & cyber security)

@ Resillion | Hasselt, Belgium

Security Lead - Air Cargo

@ Adani Group | MUMBAI, MAHARASHTRA, India