A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Redhat rhivos
|
Fri, 03 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Oct 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 03 Oct 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication. | |
| Title | Qemu-kvm: vnc websocket handshake use-after-free | |
| First Time appeared |
Redhat
Redhat advanced Virtualization Redhat enterprise Linux Redhat openshift Redhat rhivos |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:/a:redhat:advanced_virtualization:8::el8 cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 cpe:/o:redhat:rhivos:1 |
|
| Vendors & Products |
Redhat
Redhat advanced Virtualization Redhat enterprise Linux Redhat openshift Redhat rhivos |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2025-10-03T10:30:34.427Z
Updated: 2025-10-10T00:47:58.366Z
Reserved: 2025-10-01T17:03:04.737Z
Link: CVE-2025-11234
Updated: 2025-10-03T15:57:00.572Z
Status : Awaiting Analysis
Published: 2025-10-03T11:15:30.437
Modified: 2025-10-06T14:57:05.000
Link: CVE-2025-11234