On Wed, 10 Jan 2018 21:44:29 +0100, R.S. wrote:

>BTW: It's worth to remember chances the vulnerability would really
>compromise system security are really small. (IMHO)

I agree. Especially since the method of exploiting it involves flushing 
cache and testing to see what memory location was reloaded into 
cache. In a real system the amount of cache activity is too high for 
the technique to be reliable. And the attacking task would use a lot 
of CPU, making it unlikely that WLM would allow it to complete its 
work without being interrupted frequently.

-- 
Tom Marchant

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to