Non-transparent sharing of branch predictor within a context in some Intel Processors may allow an authorized user to potentially enable information disclosure via local access.
Unprivileged eBPF has always been disabled by default in Bottlerocket, which mitigates the current known vector to exploit this vulnerability.
Non-transparent sharing of branch predictor within a context in some Intel Processors may allow an authorized user to potentially enable information disclosure via local access.
Unprivileged eBPF has always been disabled by default in Bottlerocket, which mitigates the current known vector to exploit this vulnerability.