A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 03 Oct 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 03 Oct 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication. | |
Title | Qemu-kvm: vnc websocket handshake use-after-free | |
First Time appeared |
Redhat
Redhat advanced Virtualization Redhat enterprise Linux Redhat openshift Redhat rhivos |
|
Weaknesses | CWE-416 | |
CPEs | cpe:/a:redhat:advanced_virtualization:8::el8 cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 cpe:/o:redhat:rhivos:1 |
|
Vendors & Products |
Redhat
Redhat advanced Virtualization Redhat enterprise Linux Redhat openshift Redhat rhivos |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-03T10:30:34.427Z
Reserved: 2025-10-01T17:03:04.737Z
Link: CVE-2025-11234

No data.

Status : Received
Published: 2025-10-03T11:15:30.437
Modified: 2025-10-03T11:15:30.437
Link: CVE-2025-11234


No data.