Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-68202.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-68202
Upstream
Published
2025-10-03T11:15:30Z
Modified
2026-04-01T05:21:22.358535Z
Summary
CVE-2025-11234 affecting package qemu for versions less than 6.2.0-25
Details

A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.

References

Affected packages

Azure Linux:2 / qemu

Package

Name
qemu
Purl
pkg:rpm/azure-linux/qemu

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.2.0-25

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-68202.json"