Recent exploits have exposed a weakness that may be used to bypass hardware DEP. While the alarmist response was not quite on point, it does present some problems for security, as discussed here: http://blogs.zdnet.com/Bott/?p=513
Will CMF, when mature, contribute to stop this kind of exploit?
Is there a white paper or Comodo link to the general theory behind CMF?