CVE Vulnerabilities

CVE-2025-11234

Use After Free

Published: Oct 03, 2025 | Modified: Jan 22, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatqemu-kvm-17:8.2.0-11.el9_4.18*
Red Hat OpenShift Container Platform 4.16RedHatrhcos-416.94.202601071926-0*
Red Hat OpenShift Container Platform 4.17RedHatrhcos-417.94.202601120213-0*
Red Hat OpenShift Container Platform 4.18RedHatrhcos-418.94.202601071817-0*
QemuUbuntudevel*
QemuUbuntuesm-infra-legacy/trusty*
QemuUbuntuesm-infra/bionic*
QemuUbuntuesm-infra/focal*
QemuUbuntuesm-infra/xenial*
QemuUbuntujammy*
QemuUbuntunoble*
QemuUbuntuplucky*
QemuUbuntuquesting*

Potential Mitigations

References