CVE-2022-36648 — NULL Pointer Dereference in Qemu
Severity
10.0CRITICALNVD
EPSS
1.2%
top 20.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
1
Timeline
PublishedAug 22
Description
The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS. Note: This has been disputed by multiple third parties as not a valid vulnerability due to the rocker device not falling within the virtualization use case.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages1 packages
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-4xpq-qfh7-r9h2: The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7↗2023-08-22
OSV▶
CVE-2022-36648: The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7↗2023-08-22
CVEList▶
CVE-2022-36648: The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7↗2023-08-22
📋Vendor Advisories
3Microsoft▶
The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU as used in 7.0.0 and earlier allows remote attackers to crash the host qemu and potentially execute code on the hos↗2023-08-08
Debian▶
CVE-2022-36648: qemu - The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in ...↗2022