March 27, 2023, 10:38 p.m. |

Ubuntu security notices ubuntu.com

It was discovered that the network queuing discipline implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-1281)

It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or …

code crash cve denial of service free host information isolation kernel linux linux kernel local network oem prediction sensitive information service subsystem system use-after-free usn vms vmx vulnerabilities vulnerability

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Architect III

@ JPMorgan Chase & Co. | Columbus, OH, United States

Senior DevSecOps Engineer

@ Marlabs | Chennai, IN

Consultant Cyber Sécurité H/F

@ Hifield | Lyon, France

Cyber Security Consultant (Remote, US)

@ Crosslake Technologies | Remote (US)

PE Hub- SAP GRC/ IAG Consultant

@ SAP | Bengaluru, IN, 560066