Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 81455

Summary: 2.6 x86_64 incorrect TSS limits (CAN-2005-0204)
Product: Gentoo Security Reporter: Sune Kloppenborg Jeppesen (RETIRED) <jaervosz>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: minor CC: security-kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: All   
URL: http://linux.bkbits.net:8080/linux-2.6/cset@40df09acD0YLwZXJwyGltO_GSgIuXg
Whiteboard: LocalOther
Package list:
Runtime testing required: ---

Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-02-09 22:02:54 UTC
Flaw in RH 2.6 kernels. Not sure we're affected.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-03-16 02:47:51 UTC
Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.

http://www.redhat.com/support/errata/RHSA-2005-092.html
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-03-16 03:16:36 UTC
Mass-Ccing kern-sec@gentoo.org to make sure Kernel Security guys know about all
of these...
Comment 3 Daniel Drake (RETIRED) gentoo-dev 2005-03-16 05:50:42 UTC
gentoo-dev-sources unaffected
Comment 4 Tim Yamin (RETIRED) gentoo-dev 2005-03-29 07:52:19 UTC
Not affected, all amd64 keyworded kernels in Portage are using 2.6.9 or later; closing bug.