{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "7.0.0"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "last_affected": "823a3f11fb8f04c3c3cc0f95f968fef1bfc6534f"
            }
          ],
          "repo": "https://github.com/qemu/qemu",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS. Note: This has been disputed by multiple third parties as not a valid vulnerability due to the rocker device not falling within the virtualization use case.",
  "id": "CVE-2022-36648",
  "modified": "2026-03-13T21:56:32.497093946Z",
  "published": "2023-08-22T19:16:23.293Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://security.netapp.com/advisory/ntap-20231006-0004/"
    },
    {
      "type": "FIX",
      "url": "https://lists.nongnu.org/archive/html/qemu-devel/2022-06/msg04469.html"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}