On Wed, 10 Jan 2018 21:44:29 +0100, R.S. wrote: >BTW: It's worth to remember chances the vulnerability would really >compromise system security are really small. (IMHO)
I agree. Especially since the method of exploiting it involves flushing cache and testing to see what memory location was reloaded into cache. In a real system the amount of cache activity is too high for the technique to be reliable. And the attacking task would use a lot of CPU, making it unlikely that WLM would allow it to complete its work without being interrupted frequently. -- Tom Marchant ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
