Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3214

Опубликовано: 31 авг. 2015
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.9

Описание

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.

РелизСтатусПримечание
devel

released

1:2.3+dfsg-5ubuntu3
esm-infra-legacy/trusty

released

2.0.0+dfsg-2ubuntu1.15
precise

DNE

trusty

released

2.0.0+dfsg-2ubuntu1.15
trusty/esm

released

2.0.0+dfsg-2ubuntu1.15
upstream

needs-triage

utopic

ignored

end of life
vivid

released

1:2.2+dfsg-5expubuntu9.3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

pre 1.3.0
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 80%
0.0147
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

redhat
около 10 лет назад

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.

nvd
почти 10 лет назад

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.

debian
почти 10 лет назад

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and Q ...

github
больше 3 лет назад

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.

fstec
почти 10 лет назад

Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код на хостовой операционной системе

EPSS

Процентиль: 80%
0.0147
Низкий

6.9 Medium

CVSS2