<div class="container">
    <h1>Security update for qemu</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2026:20038-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2026-01-06T12:03:03Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230042">bsc#1230042</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1240157">bsc#1240157</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243013">bsc#1243013</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1246566">bsc#1246566</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1250984">bsc#1250984</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1252768">bsc#1252768</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1253002">bsc#1253002</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1254286">bsc#1254286</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-11234.html">CVE-2025-11234</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-12464.html">CVE-2025-12464</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-11234</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.7</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-11234</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-11234</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-12464</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.9</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-12464</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-12464</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Micro 6.0</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves two vulnerabilities and has six fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for qemu fixes the following issues:</p>
<p>Update to version 8.2.10.</p>
<p>Security issues fixed:</p>
<ul>
<li>CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious
  guest user to crash the QEMU process on the host (bsc#1253002).</li>
<li>CVE-2025-11234: use-after-free in WebSocket handshake operations can be exploited by a malicious client with network
  access to the VNC WebSocket port to cause a denial-of-service (bsc#1250984).</li>
</ul>
<p>Other updates and bugfixes:</p>
<ul>
<li>[openSUSE][RPM] spec: require qemu-hw-display-virtio-gpu-pci for x86 too.</li>
<li>[openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286).</li>
<li>block/curl: fix curl internal handles handling (bsc#1252768).</li>
<li>[openSUSE][RPM]: spec: qemu-vgabios is required on ppc (bsc#1230042).</li>
<li>[roms] seabios: include "pciinit: don&#x27;t misalign large BARs" (bsc#1246566).</li>
<li>[openSUSE][RPM] spec: Require ipxe and virtio-gpu packages for more arch-es (bsc#1240157).</li>
<li>
<p>[openSUSE][RPM]: disable LTO for userspace emulation on 15.6 (bsc#1243013).</p>
</li>
<li>
<p>Version 8.2.10 changes:</p>
</li>
<li>Full changelog: https://lore.kernel.org/qemu-devel/7dd1fbc7-a58f-4b2c-82b9-735840246ab2@tls.msk.ru/</li>
<li>Some backports:<ul>
<li>hw/misc/aspeed_hace: Fix buffer overflow in has_padding function</li>
<li>target/ppc: Fix e200 duplicate SPRs</li>
<li>linux-user/riscv: Fix handling of cpu mask in riscv_hwprobe syscall</li>
<li>docs/about/emulation: Fix broken link</li>
<li>vdpa: Allow vDPA to work on big-endian machine</li>
<li>vdpa: Fix endian bugs in shadow virtqueue</li>
<li>target/loongarch: Fix vldi inst</li>
<li>target/arm: Simplify pstate_sm check in sve_access_check</li>
<li>target/arm: Make DisasContext.{fp, sve}_access_checked tristate</li>
<li>util/cacheflush: Make first DSB unconditional on aarch64</li>
<li>ui/cocoa: Temporarily ignore annoying deprecated declaration warnings</li>
<li>docs: Rename default-configs to configs</li>
<li>block: Zero block driver state before reopening</li>
<li>hw/xen/hvm: Fix Aarch64 typo</li>
<li>hw/net/smc91c111: Don&#x27;t allow data register access to overrun buffer</li>
<li>hw/net/smc91c111: Sanitize packet length on tx</li>
<li>hw/net/smc91c111: Sanitize packet numbers</li>
<li>hw/net/smc91c111: Ignore attempt to pop from empty RX fifo</li>
<li>ppc/pnv/occ: Fix common area sensor offsets</li>
<li>net: move backend cleanup to NIC cleanup</li>
<li>net: parameterize the removing client from nc list</li>
<li>util/qemu-timer.c: Don&#x27;t warp timer from timerlist_rearm()</li>
<li>target/arm: Correct STRD atomicity</li>
<li>target/arm: Correct LDRD atomicity and fault behaviour</li>
</ul>
</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Micro 6.0
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-6.0-545=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>qemu-chardev-spice-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-guest-agent-8.2.10-1.1</li>
                        
                            <li>qemu-hw-display-virtio-gpu-pci-8.2.10-1.1</li>
                        
                            <li>qemu-hw-usb-host-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-pr-helper-8.2.10-1.1</li>
                        
                            <li>qemu-hw-display-qxl-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-debugsource-8.2.10-1.1</li>
                        
                            <li>qemu-block-iscsi-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-chardev-spice-8.2.10-1.1</li>
                        
                            <li>qemu-hw-display-virtio-vga-8.2.10-1.1</li>
                        
                            <li>qemu-hw-display-virtio-gpu-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-hw-usb-redirect-8.2.10-1.1</li>
                        
                            <li>qemu-ui-spice-core-8.2.10-1.1</li>
                        
                            <li>qemu-ui-spice-core-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-block-curl-8.2.10-1.1</li>
                        
                            <li>qemu-hw-usb-redirect-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-block-ssh-8.2.10-1.1</li>
                        
                            <li>qemu-ui-opengl-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-img-8.2.10-1.1</li>
                        
                            <li>qemu-ksm-8.2.10-1.1</li>
                        
                            <li>qemu-tools-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-block-ssh-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-tools-8.2.10-1.1</li>
                        
                            <li>qemu-block-rbd-8.2.10-1.1</li>
                        
                            <li>qemu-ui-opengl-8.2.10-1.1</li>
                        
                            <li>qemu-audio-spice-8.2.10-1.1</li>
                        
                            <li>qemu-block-iscsi-8.2.10-1.1</li>
                        
                            <li>qemu-8.2.10-1.1</li>
                        
                            <li>qemu-block-rbd-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-hw-display-qxl-8.2.10-1.1</li>
                        
                            <li>qemu-audio-spice-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-pr-helper-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-hw-display-virtio-vga-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-hw-display-virtio-gpu-8.2.10-1.1</li>
                        
                            <li>qemu-img-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-block-curl-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-guest-agent-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-hw-usb-host-8.2.10-1.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Micro 6.0 (x86_64)
                    <ul>
                        
                            <li>qemu-accel-tcg-x86-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-x86-8.2.10-1.1</li>
                        
                            <li>qemu-accel-tcg-x86-8.2.10-1.1</li>
                        
                            <li>qemu-x86-debuginfo-8.2.10-1.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Micro 6.0 (noarch)
                    <ul>
                        
                            <li>qemu-seabios-8.2.101.16.3_3_ga95067eb-1.1</li>
                        
                            <li>qemu-ipxe-8.2.10-1.1</li>
                        
                            <li>qemu-vgabios-8.2.101.16.3_3_ga95067eb-1.1</li>
                        
                            <li>qemu-lang-8.2.10-1.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Micro 6.0 (s390x)
                    <ul>
                        
                            <li>qemu-s390x-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-s390x-8.2.10-1.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Micro 6.0 (aarch64)
                    <ul>
                        
                            <li>qemu-arm-debuginfo-8.2.10-1.1</li>
                        
                            <li>qemu-arm-8.2.10-1.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-11234.html">https://www.suse.com/security/cve/CVE-2025-11234.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-12464.html">https://www.suse.com/security/cve/CVE-2025-12464.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230042">https://bugzilla.suse.com/show_bug.cgi?id=1230042</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1240157">https://bugzilla.suse.com/show_bug.cgi?id=1240157</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1243013">https://bugzilla.suse.com/show_bug.cgi?id=1243013</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1246566">https://bugzilla.suse.com/show_bug.cgi?id=1246566</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1250984">https://bugzilla.suse.com/show_bug.cgi?id=1250984</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1252768">https://bugzilla.suse.com/show_bug.cgi?id=1252768</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1253002">https://bugzilla.suse.com/show_bug.cgi?id=1253002</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1254286">https://bugzilla.suse.com/show_bug.cgi?id=1254286</a>
                    </li>
                
            
        </ul>
    
</div>