Back to bug 2167288
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Sandipan Roy | 2023-02-06 06:26:32 UTC | CC | chwhite, debarbos, ezulian, jlelli, jwyatt, lgoncalv, lleshchi, qzhao, swood, tyberry, williams | |
| Sandipan Roy | 2023-02-06 06:27:12 UTC | Blocks | 2167265 | |
| Sandipan Roy | 2023-02-06 06:27:27 UTC | CC | dfreiber, jburrell, rogbas, vkumar | |
| Sandipan Roy | 2023-02-06 15:20:11 UTC | Depends On | 2167419, 2167421, 2167420, 2167418 | |
| Kazu Yoshida | 2023-03-02 00:08:54 UTC | CC | kyoshida | |
| Red Hat Bugzilla | 2023-04-01 08:39:50 UTC | CC | dhoward | |
| Rohit Keshri | 2023-04-18 15:54:30 UTC | Doc Text | A vulnerability was found in the Linux kernel, where it fails to mitigate the Spectre-BTI attack (using the kernel API) as IBPB is not issued immediately (during the syscall) until the next schedule, and leaves the system under threat. | |
| Paige Jung | 2023-04-18 16:04:54 UTC | Doc Text | A vulnerability was found in the Linux kernel, where it fails to mitigate the Spectre-BTI attack (using the kernel API) as IBPB is not issued immediately (during the syscall) until the next schedule, and leaves the system under threat. | A flaw was found in the Linux kernel. This issue occurs due to a failure mitigating the Spectre-BTI attack (using the kernel API), as IBPB is not issued during the syscall until the next schedule, leaving the system vulnerable. |
| Red Hat Bugzilla | 2023-07-07 08:27:53 UTC | Assignee | security-response-team | nobody |
| James Hartsock | 2023-07-08 02:42:02 UTC | CC | hartsjc |
Back to bug 2167288