Back to bug 2174765
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Alex | 2023-03-02 12:29:26 UTC | Depends On | 2174769 | |
| Alex | 2023-03-02 12:46:06 UTC | Doc Text | A flaw was found in HW. When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. | |
| RaTasha Tillery-Smith | 2023-03-02 13:11:42 UTC | Doc Text | A flaw was found in HW. When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. | A flaw was found in HW. When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch, potentially resulting in information disclosure. |
| Product Security DevOps Team | 2023-03-02 16:17:10 UTC | Resolution | --- | NOTABUG |
| Status | NEW | CLOSED | ||
| Last Closed | 2023-03-02 16:17:10 UTC | |||
| Alex | 2023-03-29 08:16:56 UTC | CC | allarkin, chwhite, dbohanno, debarbos, ezulian, jdenham, jlelli, jwyatt, ldoskova, lgoncalv, lleshchi, qzhao, rrobaina, rysulliv, swood, tyberry, wcosta, williams, wmealing, ycote | |
| Alex | 2023-06-11 09:49:55 UTC | CC | dfreiber, jburrell, rogbas, vkumar | |
| Herton R. Krzesinski | 2023-08-16 23:49:49 UTC | Flags | needinfo?(allarkin) |
Back to bug 2174765