Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:1831

Опубликовано: 06 фев. 2026
Источник: rocky
Оценка: Moderate

Описание

Moderate: qemu-kvm security update

Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

Security Fix(es):

  • qemu-kvm: VNC WebSocket handshake use-after-free (CVE-2025-11234)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
qemu-kvm-device-usb-hostx86_6414.el10_1.5qemu-kvm-device-usb-host-10.0.0-14.el10_1.5.x86_64.rpm
qemu-kvm-ui-egl-headlessx86_6414.el10_1.5qemu-kvm-ui-egl-headless-10.0.0-14.el10_1.5.x86_64.rpm
qemu-kvm-device-display-virtio-gpux86_6414.el10_1.5qemu-kvm-device-display-virtio-gpu-10.0.0-14.el10_1.5.x86_64.rpm
qemu-kvm-audio-pax86_6414.el10_1.5qemu-kvm-audio-pa-10.0.0-14.el10_1.5.x86_64.rpm
qemu-pr-helperx86_6414.el10_1.5qemu-pr-helper-10.0.0-14.el10_1.5.x86_64.rpm
qemu-kvm-block-blkiox86_6414.el10_1.5qemu-kvm-block-blkio-10.0.0-14.el10_1.5.x86_64.rpm
qemu-kvm-device-usb-redirectx86_6414.el10_1.5qemu-kvm-device-usb-redirect-10.0.0-14.el10_1.5.x86_64.rpm
qemu-kvm-device-display-virtio-gpu-pcix86_6414.el10_1.5qemu-kvm-device-display-virtio-gpu-pci-10.0.0-14.el10_1.5.x86_64.rpm
qemu-kvm-ui-openglx86_6414.el10_1.5qemu-kvm-ui-opengl-10.0.0-14.el10_1.5.x86_64.rpm
qemu-kvm-toolsx86_6414.el10_1.5qemu-kvm-tools-10.0.0-14.el10_1.5.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.5
ubuntu
6 месяцев назад

A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.

CVSS3: 7.5
redhat
6 месяцев назад

A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.

CVSS3: 7.5
nvd
6 месяцев назад

A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.

CVSS3: 7.5
msrc
6 месяцев назад

Qemu-kvm: vnc websocket handshake use-after-free

CVSS3: 7.5
debian
6 месяцев назад

A flaw was found in QEMU. If the QIOChannelWebsock object is freed whi ...