Summary: | 2.6 x86_64 incorrect TSS limits (CAN-2005-0204) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | minor | CC: | security-kernel |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://linux.bkbits.net:8080/linux-2.6/cset@40df09acD0YLwZXJwyGltO_GSgIuXg | ||
Whiteboard: | LocalOther | ||
Package list: | Runtime testing required: | --- |
Description
Sune Kloppenborg Jeppesen (RETIRED)
![]() Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction. http://www.redhat.com/support/errata/RHSA-2005-092.html Mass-Ccing kern-sec@gentoo.org to make sure Kernel Security guys know about all of these... gentoo-dev-sources unaffected Not affected, all amd64 keyworded kernels in Portage are using 2.6.9 or later; closing bug. |