<div class="container">
    <h1>Security update for qemu</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2025:21230-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2025-12-18T12:50:21Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230042">bsc#1230042</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1250984">bsc#1250984</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1253002">bsc#1253002</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1254286">bsc#1254286</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1254494">bsc#1254494</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-11234.html">CVE-2025-11234</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-12464.html">CVE-2025-12464</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-11234</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.7</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-11234</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-11234</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-12464</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.9</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-12464</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-12464</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Micro 6.2</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves two vulnerabilities and has three fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for qemu fixes the following issues:</p>
<p>Update to version 10.0.7.</p>
<p>Security issues fixed:</p>
<ul>
<li>CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious
  guest user to crash the QEMU process on the host (bsc#1253002).</li>
<li>CVE-2025-11234: use-after-free in WebSocket handshake operations can be exploited by a malicious client with network
  access to the VNC WebSocket port to cause a denial-of-service (bsc#1250984).</li>
</ul>
<p>Other updates and bugfixes:</p>
<ul>
<li>Version 10.0.7:</li>
<li>kvm: Fix kvm_vm_ioctl() and kvm_device_ioctl() return value</li>
<li>docs/devel: Update URL for make-pullreq script</li>
<li>target/arm: Fix assert on BRA.</li>
<li>hw/aspeed/{xdma, rtc, sdhci}: Fix endianness to DEVICE_LITTLE_ENDIAN</li>
<li>hw/core/machine: Provide a description for aux-ram-share property</li>
<li>hw/pci: Make msix_init take a uint32_t for nentries</li>
<li>block/io_uring: avoid potentially getting stuck after resubmit at the end of ioq_submit()</li>
<li>block-backend: Fix race when resuming queued requests</li>
<li>ui/vnc: Fix qemu abort when query vnc info</li>
<li>chardev/char-pty: Do not ignore chr_write() failures</li>
<li>hw/display/exynos4210_fimd: Account for zero length in fimd_update_memory_section()</li>
<li>hw/arm/armv7m: Disable reentrancy guard for v7m_sysreg_ns_ops MRs</li>
<li>hw/arm/aspeed: Fix missing SPI IRQ connection causing DMA interrupt failure</li>
<li>migration: Fix transition to COLO state from precopy</li>
<li>
<p>Full backport list: https://lore.kernel.org/qemu-devel/1765037524.347582.2700543.nullmailer@tls.msk.ru/</p>
</li>
<li>
<p>Version 10.0.6:</p>
</li>
<li>linux-user/microblaze: Fix little-endianness binary</li>
<li>target/hppa: correct size bit parity for fmpyadd</li>
<li>target/i386: user: do not set up a valid LDT on reset</li>
<li>async: access bottom half flags with qatomic_read</li>
<li>target/i386: fix x86_64 pushw op</li>
<li>i386/tcg/smm_helper: Properly apply DR values on SMM entry / exit</li>
<li>i386/cpu: Prevent delivering SIPI during SMM in TCG mode</li>
<li>i386/kvm: Expose ARCH_CAP_FB_CLEAR when invulnerable to MDS</li>
<li>target/i386: Fix CR2 handling for non-canonical addresses</li>
<li>block/curl.c: Use explicit long constants in curl_easy_setopt calls</li>
<li>pcie_sriov: Fix broken MMIO accesses from SR-IOV VFs</li>
<li>target/riscv: rvv: Fix vslide1[up|down].vx unexpected result when XLEN2 and SEWd</li>
<li>target/riscv: Fix ssamoswap error handling</li>
<li>
<p>Full backport list: https://lore.kernel.org/qemu-devel/1761022287.744330.6357.nullmailer@tls.msk.ru/</p>
</li>
<li>
<p>Version 10.0.5:</p>
</li>
<li>tests/functional/test_aarch64_sbsaref_freebsd: Fix the URL of the ISO image</li>
<li>tests/functional/test_ppc_bamboo: Replace broken link with working assets</li>
<li>physmem: Destroy all CPU AddressSpaces on unrealize</li>
<li>memory: New AS helper to serialize destroy+free</li>
<li>include/system/memory.h: Clarify address_space_destroy() behaviour</li>
<li>migration: Fix state transition in postcopy_start() error handling</li>
<li>target/riscv: rvv: Modify minimum VLEN according to enabled vector extensions</li>
<li>target/riscv: rvv: Replace checking V by checking Zve32x</li>
<li>target/riscv: Fix endianness swap on compressed instructions</li>
<li>hw/riscv/riscv-iommu: Fixup PDT Nested Walk</li>
<li>
<p>Full backport list: https://lore.kernel.org/qemu-devel/1759986125.676506.643525.nullmailer@tls.msk.ru/</p>
</li>
<li>
<p>[openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286).</p>
</li>
<li>[openSUSE][RPM] spec: make glusterfs support conditional (bsc#1254494).</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Micro 6.2
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SL-Micro-6.2-112=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>qemu-chardev-spice-10.0.7-160000.1.1</li>
                        
                            <li>qemu-block-ssh-10.0.7-160000.1.1</li>
                        
                            <li>qemu-tools-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-display-virtio-gpu-10.0.7-160000.1.1</li>
                        
                            <li>qemu-guest-agent-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-usb-host-10.0.7-160000.1.1</li>
                        
                            <li>qemu-audio-spice-10.0.7-160000.1.1</li>
                        
                            <li>qemu-debugsource-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-display-virtio-vga-10.0.7-160000.1.1</li>
                        
                            <li>qemu-block-ssh-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-pr-helper-10.0.7-160000.1.1</li>
                        
                            <li>qemu-ui-spice-core-10.0.7-160000.1.1</li>
                        
                            <li>qemu-chardev-spice-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-usb-redirect-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-usb-host-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-block-iscsi-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-ui-spice-core-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-display-virtio-gpu-pci-10.0.7-160000.1.1</li>
                        
                            <li>qemu-ui-opengl-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-display-virtio-gpu-pci-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-guest-agent-10.0.7-160000.1.1</li>
                        
                            <li>qemu-pr-helper-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-display-qxl-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-ksm-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-display-qxl-10.0.7-160000.1.1</li>
                        
                            <li>qemu-audio-spice-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-img-10.0.7-160000.1.1</li>
                        
                            <li>qemu-ui-opengl-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-usb-redirect-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-display-virtio-vga-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-block-iscsi-10.0.7-160000.1.1</li>
                        
                            <li>qemu-tools-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-display-virtio-gpu-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-img-debuginfo-10.0.7-160000.1.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Micro 6.2 (noarch)
                    <ul>
                        
                            <li>qemu-seabios-10.0.71.16.3_3_g3d33c746-160000.1.1</li>
                        
                            <li>qemu-SLOF-10.0.7-160000.1.1</li>
                        
                            <li>qemu-ipxe-10.0.7-160000.1.1</li>
                        
                            <li>qemu-vgabios-10.0.71.16.3_3_g3d33c746-160000.1.1</li>
                        
                            <li>qemu-lang-10.0.7-160000.1.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Micro 6.2 (x86_64)
                    <ul>
                        
                            <li>qemu-x86-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-vmsr-helper-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-x86-10.0.7-160000.1.1</li>
                        
                            <li>qemu-vmsr-helper-10.0.7-160000.1.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Micro 6.2 (aarch64)
                    <ul>
                        
                            <li>qemu-arm-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-arm-10.0.7-160000.1.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Micro 6.2 (ppc64le)
                    <ul>
                        
                            <li>qemu-ppc-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-ppc-10.0.7-160000.1.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Micro 6.2 (s390x)
                    <ul>
                        
                            <li>qemu-s390x-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-s390x-virtio-gpu-ccw-10.0.7-160000.1.1</li>
                        
                            <li>qemu-hw-s390x-virtio-gpu-ccw-debuginfo-10.0.7-160000.1.1</li>
                        
                            <li>qemu-s390x-10.0.7-160000.1.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-11234.html">https://www.suse.com/security/cve/CVE-2025-11234.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-12464.html">https://www.suse.com/security/cve/CVE-2025-12464.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230042">https://bugzilla.suse.com/show_bug.cgi?id=1230042</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1250984">https://bugzilla.suse.com/show_bug.cgi?id=1250984</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1253002">https://bugzilla.suse.com/show_bug.cgi?id=1253002</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1254286">https://bugzilla.suse.com/show_bug.cgi?id=1254286</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1254494">https://bugzilla.suse.com/show_bug.cgi?id=1254494</a>
                    </li>
                
            
        </ul>
    
</div>