CVE-2015-3214

Publication date 17 June 2015

Last updated 24 July 2024


Ubuntu priority

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.

Read the notes from the security team

Status

Package Ubuntu Release Status
qemu 15.04 vivid
Fixed 1:2.2+dfsg-5expubuntu9.3
14.10 utopic Ignored end of life
14.04 LTS trusty
Fixed 2.0.0+dfsg-2ubuntu1.15
12.04 LTS precise Not in release
qemu-kvm 15.04 vivid Not in release
14.10 utopic Not in release
14.04 LTS trusty Not in release
12.04 LTS precise
Not affected

Notes


sbeattie

introduced in 0505bcdec8228d8de39ab1a02644e71999e7c05, 1.3.0 first version

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
qemu

References

Related Ubuntu Security Notices (USN)

Other references