Hmm
Both attacks require running a local process. If you have hostile software successfully running on your device you're already screwed regardless of the mechanism.
It's an interesting exploit but some of the recent panics are more about an unrealistic idea of system security from researchers than the actual threat.