Oct. 20, 2023, 2:36 p.m. |

Packet Storm packetstormsecurity.com

Ubuntu Security Notice 6416-3 - It was discovered that the IPv6 implementation in the Linux kernel contained a high rate of hash collisions in connection lookup table. A remote attacker could use this to cause a denial of service. Daniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD processors utilising speculative execution and branch prediction may allow unauthorised memory reads via a speculative side-channel attack. A local attacker could use this to expose sensitive information, including kernel memory.

amd attacker daniel denial of service hash hash collisions high implementation ipv6 kernel linux linux kernel notice processors rate security security notice service speculative execution ubuntu usn

Principal Engineer - DLP Endpoint Security

@ Netskope | Bengaluru, Karnataka, India

Security Consultant (m/w/d)

@ Deutsche Telekom | Berlin, Deutschland

Security Engineer

@ IDEMIA | Haarlem, NL, 2031 CC

CyberSecurity Forensics and Incident Response Analyst

@ Bosch Group | Pittsburgh, PA, United States

Cyber MS MDR - Sr Associate

@ KPMG India | Bengaluru, Karnataka, India

Senior Lead Cybersecurity Architect-Threat modeling, Cryptography

@ JPMorgan Chase & Co. | India