Back to bug 2187257

Who When What Removed Added
Mauro Matteo Cascella 2023-04-17 09:30:20 UTC Depends On 2187260
Mauro Matteo Cascella 2023-04-17 09:56:22 UTC Depends On 2187269, 2187267, 2187268, 2187266
Mauro Matteo Cascella 2023-04-17 10:13:39 UTC Doc Text It was found that the Linux Kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The kernel failed to protect applications that attempted to protect against Spectre v2 leaving them open to attack from other processes running on the same physical core in another hyperthread.
Mauro Matteo Cascella 2023-04-17 10:49:07 UTC Comment 4 updated
Alex 2023-04-17 13:21:56 UTC Flags needinfo?(mcascell)
Alex 2023-04-17 14:05:19 UTC Comment 5 updated
Mauro Matteo Cascella 2023-04-19 12:46:05 UTC Flags needinfo?(mcascell)
Daniel Reynolds 2023-04-21 02:47:53 UTC CC dareynol
Kazu Yoshida 2023-04-27 04:17:55 UTC CC kyoshida
Alex 2023-04-30 10:12:24 UTC Flags needinfo?(allarkin)
CC rcheerla
Flags needinfo?(allarkin)
Zack Miele 2023-06-13 20:18:35 UTC Depends On 2214849
Beth Uptagrafft 2023-06-13 21:52:47 UTC CC zmiele
Flags needinfo?(zmiele)
Zack Miele 2023-06-14 13:00:12 UTC Depends On 2215014
Zack Miele 2023-06-14 15:14:09 UTC Depends On 2215056
Zack Miele 2023-06-14 15:17:37 UTC Flags needinfo?(zmiele)
Zack Miele 2023-06-14 18:24:05 UTC Depends On 2215108
Red Hat Bugzilla 2023-07-07 08:28:58 UTC Assignee security-response-team nobody
errata-xmlrpc 2023-08-01 08:59:22 UTC Link ID Red Hat Product Errata RHSA-2023:4378
errata-xmlrpc 2023-08-01 09:17:35 UTC Link ID Red Hat Product Errata RHSA-2023:4377
Product Security DevOps Team 2023-08-01 17:02:32 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2023-08-01 17:02:32 UTC

Back to bug 2187257