While Google P0 was using eBPF to exploit #Spectre, they found some run-of-the-mill implementation vulnerabilities in eBPF along the way: https://bugs.chromium.org/p/project-zero/issues/detail?id=1454&desc=3 …
Disable eBPF with kernel.unprivileged_bpf_disabled = 1 sysctl.
11:54 AM - 5 Jan 2018
0 replies
0 retweets
3 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.