So, I was looking up everywhere and could not find any mitigation for Spectre attack by the vim interpreter! I don't know if my question is correct or how feasible it is, but do you recall if there is any mitigation for different variants of Spectre attacks Specter v1 (Spectre-PHT), v2 (Spectre-BTB), v4 (Spectre-STL) and v5 (Spectre-RSB) at the interpreter level for vim? Since Spectre is all about speculative execution and not the actual translation (interpretation) steps I thought it might be dangerous that there is not any mitigation for it by the interpreter, I might be way too wrong tho. I just felt, since there's no mitigation, it might be a good idea to send a text and let you guys know about it. And please correct me if there are mitigations for spectre in vim interpreter. Looking forward to hearing from you guys
-- -- You received this message from the "vim_dev" maillist. Do not top-post! Type your reply below the text you are replying to. For more information, visit http://www.vim.org/maillist.php --- You received this message because you are subscribed to the Google Groups "vim_dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/vim_dev/5d65d4c0-4b56-4a41-ba00-27fd3b25a9c7n%40googlegroups.com.
