Non-transparent sharing of branch predictor selectors between contexts in some Intel Processors may allow an authorized user to potentially enable information disclosure.
Unprivileged eBPF has always been disabled by default in Bottlerocket, which mitigates the current known vector to exploit this vulnerability.
Non-transparent sharing of branch predictor selectors between contexts in some Intel Processors may allow an authorized user to potentially enable information disclosure.
Unprivileged eBPF has always been disabled by default in Bottlerocket, which mitigates the current known vector to exploit this vulnerability.