The vulnerability is related to the multi-scheduler queues in CPUs.
By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.
source: www.techworm.net
The vulnerability is related to the multi-scheduler queues in CPUs.
By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.
source: www.techworm.net