On Thu, 11 May 2006 12:00:40 +0200, "Ed White" <[EMAIL PROTECTED]> said: > A researcher of the french NSA discovered a scary vulnerability in modern > x86 > cpus and chipsets that expose the kernel to direct tampering. > > http://www.securityfocus.com/print/columnists/402 > > The problem is that a feature called System Management Mode could be used > to > bypass the kernel and execute code at the highest level possible: ring > zero. > > The big problem is that the attack is possible thanks to the way X > Windows is > designed, and so the only way to eradicate it is to redesign it, moving > video > card driver into the kernel, but it seems that this cannot be done also > for > missing drivers and documentation! > > This is another example of insecurity that cannot be fixed because of > unresponsible vendors...
This has been disscused; http://marc.theaimsgroup.com/?l=openbsd-misc&m=114657401630096&w=2 If I understand correctly from what I've been told, this is not a hardware issue but an 'X' issue. -- Eric Furman [EMAIL PROTECTED]