Re: SecurityFocus Article

From: Segher Boessenkool
Date: Thu May 11 2006 - 20:18:51 EST


If the SMRAM control register exists, the D_LCK bit can be set
in 16-bit mode during the boot sequence. This makes the SMRAM
register read/only so the long potential compromise sequence
that Mr. Duflot describes would not be possible. If the control
register doesn't exist, then the vulnerably doesn't exist.

No, if there is no mechanism to lock down SMmode (re)configuration,
the vulnerability of course _does_ exist.

The writer doesn't like the fact that a root process can execute

Rest of this email happily ignored...


Segher

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/