When a client connects to the VNC server, QEMU will check whether the current number of connections is greater than the limitation. If so, it will clean up the previous connection. If that connection happens to be in the handshake phase and fails, QEMU will clean up the connection again, which will result in a NULL pointer dereference issue. A remote unauthenticated user could use this flaw to cause a denial of service.
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 2218149]
Upstream patch: https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg01014.html
Patch v2: https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg02668.html