Any idea at all what sort of privileges this requires, like whether or not it can be exploited from ring 3 or if it needs ring 0 (e.g. to send commands over HECI)?
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
Required privileges
Date: 2017-11-28 01:38 am (UTC)