Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 81455 - 2.6 x86_64 incorrect TSS limits (CAN-2005-0204)
Summary: 2.6 x86_64 incorrect TSS limits (CAN-2005-0204)
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All All
: High minor (vote)
Assignee: Gentoo Security
URL: http://linux.bkbits.net:8080/linux-2....
Whiteboard: LocalOther
Keywords:
Depends on:
Blocks:
 
Reported: 2005-02-09 22:02 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2005-03-29 07:52 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-02-09 22:02:54 UTC
Flaw in RH 2.6 kernels. Not sure we're affected.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-03-16 02:47:51 UTC
Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.

http://www.redhat.com/support/errata/RHSA-2005-092.html
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-03-16 03:16:36 UTC
Mass-Ccing kern-sec@gentoo.org to make sure Kernel Security guys know about all
of these...
Comment 3 Daniel Drake (RETIRED) gentoo-dev 2005-03-16 05:50:42 UTC
gentoo-dev-sources unaffected
Comment 4 Tim Yamin (RETIRED) gentoo-dev 2005-03-29 07:52:19 UTC
Not affected, all amd64 keyworded kernels in Portage are using 2.6.9 or later; closing bug.