7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Qemu-kvm: vnc websocket handshake use-after-free
A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.
References
- RHBZ#2401209 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-11234 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2025-11234 x_refsource_REDHAT vdb-entry
- RHBZ#2401209 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-11234 x_refsource_REDHAT vdb-entry
- RHBZ#2401209 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-11234 x_refsource_REDHAT vdb-entry
- RHBZ#2401209 issue-tracking x_refsource_REDHAT
- RHBZ#2401209 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-11234 x_refsource_REDHAT vdb-entry
- RHSA-2025:23228 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11234 x_refsource_REDHAT vdb-entry
- RHBZ#2401209 issue-tracking x_refsource_REDHAT
- RHSA-2025:23228 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0326 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0332 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11234 x_refsource_REDHAT vdb-entry
- RHBZ#2401209 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-11234 x_refsource_REDHAT vdb-entry
- RHBZ#2401209 issue-tracking x_refsource_REDHAT
- RHSA-2025:23228 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0326 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0332 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0702 x_refsource_REDHAT vendor-advisory
- RHSA-2025:23228 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0326 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0332 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0702 x_refsource_REDHAT vendor-advisory
- RHSA-2026:1831 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-11234 x_refsource_REDHAT vdb-entry
- RHBZ#2401209 issue-tracking x_refsource_REDHAT
Affected products
- <10.1.2
- *
- *
Matching in nixpkgs
pkgs.qemu
Generic and open source machine emulator and virtualizer
pkgs.qemu_kvm
Generic and open source machine emulator and virtualizer
pkgs.qemu_xen
Generic and open source machine emulator and virtualizer
pkgs.qemu-user
QEMU User space emulator - launch executables compiled for one CPU on another CPU
pkgs.qemu_full
Generic and open source machine emulator and virtualizer
pkgs.qemu_test
Generic and open source machine emulator and virtualizer
pkgs.qemu-utils
Generic and open source machine emulator and virtualizer
pkgs.canokey-qemu
CanoKey QEMU Virt Card
pkgs.ubootQemuX86
Boot loader for embedded systems
-
nixos-unstable x86_defconfig-2025.10
- nixpkgs-unstable x86_defconfig-2025.10
- nixos-unstable-small x86_defconfig-2025.10
pkgs.ubootQemuX86_64
Boot loader for embedded systems
-
nixos-unstable x86_64_defconfig-2025.10
- nixpkgs-unstable x86_64_defconfig-2025.10
- nixos-unstable-small x86_64_defconfig-2025.10
pkgs.ubootQemuAarch64
Boot loader for embedded systems
-
nixos-unstable qemu_arm64_defconfig-2025.10
- nixpkgs-unstable qemu_arm64_defconfig-2025.10
- nixos-unstable-small qemu_arm64_defconfig-2025.10
pkgs.qemu-python-utils
Python tooling used by the QEMU project to build, configure, and test QEMU
pkgs.armTrustedFirmwareQemu
Reference implementation of secure world software for ARMv8-A
pkgs.python312Packages.qemu
Python tooling used by the QEMU project to build, configure, and test QEMU
pkgs.python313Packages.qemu
Python tooling used by the QEMU project to build, configure, and test QEMU
pkgs.python312Packages.qemu-qmp
Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers
pkgs.python313Packages.qemu-qmp
Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers
Package maintainers
-
@lopsided98 Ben Wolsieffer <benwolsieffer@gmail.com>
-
@oxalica oxalica <oxalicc@pm.me>
-
@DavHau David Hauer <d.hauer.it@gmail.com>
-
@devplayer0 Jack O'Sullivan <dev@nul.ie>
-
@alyssais Alyssa Ross <hi@alyssa.is>
-
@SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
-
@CertainLach Yaroslav Bolyukin <iam@lach.pw>
-
@hehongbo Hongbo
-
@bartsch Daniel Martin <consume.noise@gmail.com>
-
@dezgeg Tuomas Tynkkynen <tuomas.tynkkynen@iki.fi>
-
@brianmcgillion Brian McGillion <bmg.avoin@gmail.com>