Reply to post: Re: Another simple mitigation

SPOILER alert, literally: Intel CPUs afflicted with simple data-spewing spec-exec vulnerability

Anonymous Coward
Anonymous Coward

Re: Another simple mitigation

No - ASLR randomises the layout of logical memory space to prevent you guessing where in memory key data structures such as the heap/stack lie in order to cause executable code to be placed onto them.

Spectre looks at memory residing within processor cache across processes caused by the delay between an instruction generating a memory access violation and the instructions in the speculative execution pipeline being flushed. i.e. the "physical" cache lines vs the logical addresses.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon