There have been many articles on this. This new attack is a very good example of how hackers go after implementation flaws rather than the actual crypto algorithms.
We discussed this and also about side channel attacks in the book. Comprehensive threat modelling, secure design and immaculate implementation are really hard to conquer. Anyways, it is time to get patching.