CVE-2015-3214

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 75%
VendorProductVersion
qemuqemu
𝑥
≤ 2.3.0
linuxlinux_kernel
𝑥
≤ 2.6.32
aristaeos
4.12
aristaeos
4.13
aristaeos
4.14
aristaeos
4.15
debiandebian_linux
7.0
debiandebian_linux
8.0
lenovoemc_px12-400r_ivx
𝑥
< 1.0.10.33264
lenovoemc_px12-450r_ivx
𝑥
< 1.0.10.33264
redhatopenstack
5.0
redhatopenstack
6.0
redhatvirtualization
3.0
redhatenterprise_linux_compute_node_eus
7.1
redhatenterprise_linux_compute_node_eus
7.2
redhatenterprise_linux_compute_node_eus
7.3
redhatenterprise_linux_compute_node_eus
7.4
redhatenterprise_linux_compute_node_eus
7.5
redhatenterprise_linux_compute_node_eus
7.6
redhatenterprise_linux_compute_node_eus
7.7
redhatenterprise_linux_for_power_big_endian
7.0
redhatenterprise_linux_for_power_big_endian_eus
7.1_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.2_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.3_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.4_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.5_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.6_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.7_ppc64:_ppc64
redhatenterprise_linux_for_scientific_computing
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.3
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_aus
7.7
redhatenterprise_linux_server_eus
7.1
redhatenterprise_linux_server_eus
7.2
redhatenterprise_linux_server_eus
7.3
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_eus
7.7
redhatenterprise_linux_server_from_rhui
7.0
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_server_tus
7.7
redhatenterprise_linux_server_update_services_for_sap_solutions
7.2
redhatenterprise_linux_server_update_services_for_sap_solutions
7.3
redhatenterprise_linux_server_update_services_for_sap_solutions
7.4
redhatenterprise_linux_server_update_services_for_sap_solutions
7.6
redhatenterprise_linux_server_update_services_for_sap_solutions
7.7
redhatenterprise_linux_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bullseye
5.10.223-1
fixed
wheezy
not-affected
squeeze
no-dsa
bullseye (security)
5.10.226-1
fixed
bookworm
6.1.106-3
fixed
bookworm (security)
6.1.112-1
fixed
trixie
6.11.5-1
fixed
sid
6.11.6-1
fixed
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
wheezy
not-affected
squeeze
no-dsa
bullseye (security)
1:5.2+dfsg-11+deb11u2
fixed
bookworm
1:7.2+dfsg-7+deb12u7
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
xen
bullseye
4.14.6-1
fixed
wheezy
not-affected
squeeze
no-dsa
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
trixie
4.17.3+36-g54dacb5c02-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
vivid
Fixed 1:2.2+dfsg-5expubuntu9.3
released
utopic
ignored
trusty
Fixed 2.0.0+dfsg-2ubuntu1.15
released
precise
dne
qemu-kvm
vivid
dne
utopic
dne
trusty
dne
precise
not-affected
References