May 18, 2023, 8:38 p.m. |

Ubuntu security notices ubuntu.com

It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)

Jordy Zomer and Alexandra Sandulescu …

address amd conditions cve driver error graphics i915 information intel kernel linux linux kernel local processors return sensitive information smt usn vulnerabilities x86

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Cyberark Engineer

@ Global Payments | Plano

Group Specialist – Network Security

@ DP World | Bengaluru, Karnataka, India

Cybersecurity Service Engineer

@ Atos | Timisoara, RO

Senior Malware Reverse Engineer

@ CodeHunter | McLean, Virginia, United States - Remote

Cybersecurity Software Engineer

@ LinQuest | Beavercreek, Ohio, United States