Vulnerability Description
The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS. Note: This has been disputed by multiple third parties as not a valid vulnerability due to the rocker device not falling within the virtualization use case.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 7.0.0 |
Related Weaknesses (CWE)
References
- https://lists.nongnu.org/archive/html/qemu-devel/2022-06/msg04469.htmlMailing ListPatch
- https://security.netapp.com/advisory/ntap-20231006-0004/
- https://lists.nongnu.org/archive/html/qemu-devel/2022-06/msg04469.htmlMailing ListPatch
- https://security.netapp.com/advisory/ntap-20231006-0004/
FAQ
What is CVE-2022-36648?
CVE-2022-36648 is a vulnerability with a CVSS score of 10.0 (CRITICAL). The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the h...
How severe is CVE-2022-36648?
CVE-2022-36648 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-36648?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu.