{"id":"CVE-2015-3214","details":"The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.","modified":"2026-02-04T06:40:43.494051Z","published":"2015-08-31T10:59:07Z","related":["MGASA-2015-0310","SUSE-SU-2016:1560-1","SUSE-SU-2016:1698-1","SUSE-SU-2016:1785-1"],"references":[{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924"},{"type":"ADVISORY","url":"http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1507.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1508.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1512.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3348"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/75273"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032598"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201510-02"},{"type":"ADVISORY","url":"https://support.lenovo.com/product_security/qemu"},{"type":"ADVISORY","url":"https://support.lenovo.com/us/en/product_security/qemu"},{"type":"ADVISORY","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/37990/"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/06/25/7"},{"type":"FIX","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924"},{"type":"REPORT","url":"http://rhn.redhat.com/errata/RHSA-2015-1507.html"},{"type":"REPORT","url":"http://rhn.redhat.com/errata/RHSA-2015-1508.html"},{"type":"REPORT","url":"http://www.debian.org/security/2015/dsa-3348"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1229640"},{"type":"REPORT","url":"https://security.gentoo.org/glsa/201510-02"},{"type":"WEB","url":"http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33"},{"type":"WEB","url":"https://www.mail-archive.com/qemu-devel%40nongnu.org/msg304138.html"}],"schema_version":"1.7.3"}