New type of Malware can exploit memory corruption S/W bugs by undermining ASLR

Researchers have discovered a new type of malware that can get around Address Space Layout Randomization protection used by modern OSs to exploit memory corruption software bugs.
See: A Chip Flaw Strips Away a Key Hacking Safeguard for Millions of Devices | WIRED

It appears to be a new type of file-less malware, and presumably can be stopped in its tracks in the same way as other file-less malware!

I think this was addressed here:
https://forums.comodo.com/defense-sandbox-help-cis/does-comodo-protect-you-from-javascript-side-channel-attacks-t118180.0.html;msg851226#msg851226