Vulnerability Description
A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2025:23228
- https://access.redhat.com/errata/RHSA-2026:0326
- https://access.redhat.com/errata/RHSA-2026:0332
- https://access.redhat.com/errata/RHSA-2026:0702
- https://access.redhat.com/errata/RHSA-2026:1831
- https://access.redhat.com/errata/RHSA-2026:18772
- https://access.redhat.com/errata/RHSA-2026:3077
- https://access.redhat.com/errata/RHSA-2026:3165
- https://access.redhat.com/errata/RHSA-2026:5578
- https://access.redhat.com/security/cve/CVE-2025-11234
- https://bugzilla.redhat.com/show_bug.cgi?id=2401209
FAQ
What is CVE-2025-11234?
CVE-2025-11234 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-...
How severe is CVE-2025-11234?
CVE-2025-11234 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11234?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.