Unrated severityNVD Advisory· Published Aug 31, 2015· Updated May 6, 2026
CVE-2015-3214
CVE-2015-3214
Description
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
17- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdPatchVendor Advisory
- github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924nvdPatchThird Party Advisory
- mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33nvdBroken LinkVendor Advisory
- rhn.redhat.com/errata/RHSA-2015-1507.htmlnvdIssue TrackingThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1508.htmlnvdIssue TrackingThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1512.htmlnvdThird Party Advisory
- www.debian.org/security/2015/dsa-3348nvdIssue TrackingThird Party Advisory
- www.securityfocus.com/bid/75273nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032598nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201510-02nvdIssue TrackingThird Party Advisory
- support.lenovo.com/product_security/qemunvdThird Party Advisory
- support.lenovo.com/us/en/product_security/qemunvdThird Party Advisory
- www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13nvdThird Party Advisory
- www.exploit-db.com/exploits/37990/nvdThird Party AdvisoryVDB Entry
- www.openwall.com/lists/oss-security/2015/06/25/7nvdMailing List
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- www.mail-archive.com/qemu-devel%40nongnu.org/msg304138.htmlnvd
News mentions
0No linked articles in our index yet.