{"affected":[{"ecosystem_specific":{"binaries":[{"qemu":"8.2.10-1.1","qemu-accel-tcg-x86":"8.2.10-1.1","qemu-arm":"8.2.10-1.1","qemu-audio-spice":"8.2.10-1.1","qemu-block-curl":"8.2.10-1.1","qemu-block-iscsi":"8.2.10-1.1","qemu-block-rbd":"8.2.10-1.1","qemu-block-ssh":"8.2.10-1.1","qemu-chardev-spice":"8.2.10-1.1","qemu-guest-agent":"8.2.10-1.1","qemu-hw-display-qxl":"8.2.10-1.1","qemu-hw-display-virtio-gpu":"8.2.10-1.1","qemu-hw-display-virtio-gpu-pci":"8.2.10-1.1","qemu-hw-display-virtio-vga":"8.2.10-1.1","qemu-hw-usb-host":"8.2.10-1.1","qemu-hw-usb-redirect":"8.2.10-1.1","qemu-img":"8.2.10-1.1","qemu-ipxe":"8.2.10-1.1","qemu-ksm":"8.2.10-1.1","qemu-lang":"8.2.10-1.1","qemu-pr-helper":"8.2.10-1.1","qemu-s390x":"8.2.10-1.1","qemu-seabios":"8.2.101.16.3_3_ga95067eb-1.1","qemu-tools":"8.2.10-1.1","qemu-ui-opengl":"8.2.10-1.1","qemu-ui-spice-core":"8.2.10-1.1","qemu-vgabios":"8.2.101.16.3_3_ga95067eb-1.1","qemu-x86":"8.2.10-1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.2.10-1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for qemu fixes the following issues:\n\nUpdate to version 8.2.10.\n\nSecurity issues fixed:\n\n- CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious\n  guest user to crash the QEMU process on the host (bsc#1253002).\n- CVE-2025-11234: use-after-free in WebSocket handshake operations can be exploited by a malicious client with network\n  access to the VNC WebSocket port to cause a denial-of-service (bsc#1250984).\n\nOther updates and bugfixes:\n\n- [openSUSE][RPM] spec: require qemu-hw-display-virtio-gpu-pci for x86 too.\n- [openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286).\n- block/curl: fix curl internal handles handling (bsc#1252768).\n- [openSUSE][RPM]: spec: qemu-vgabios is required on ppc (bsc#1230042).\n- [roms] seabios: include \"pciinit: don't misalign large BARs\" (bsc#1246566).\n- [openSUSE][RPM] spec: Require ipxe and virtio-gpu packages for more arch-es (bsc#1240157).\n- [openSUSE][RPM]: disable LTO for userspace emulation on 15.6 (bsc#1243013).\n\n- Version 8.2.10 changes:\n  * Full changelog: https://lore.kernel.org/qemu-devel/7dd1fbc7-a58f-4b2c-82b9-735840246ab2@tls.msk.ru/\n  * Some backports:\n    - hw/misc/aspeed_hace: Fix buffer overflow in has_padding function\n    - target/ppc: Fix e200 duplicate SPRs\n    - linux-user/riscv: Fix handling of cpu mask in riscv_hwprobe syscall\n    - docs/about/emulation: Fix broken link\n    - vdpa: Allow vDPA to work on big-endian machine\n    - vdpa: Fix endian bugs in shadow virtqueue\n    - target/loongarch: Fix vldi inst\n    - target/arm: Simplify pstate_sm check in sve_access_check\n    - target/arm: Make DisasContext.{fp, sve}_access_checked tristate\n    - util/cacheflush: Make first DSB unconditional on aarch64\n    - ui/cocoa: Temporarily ignore annoying deprecated declaration warnings\n    - docs: Rename default-configs to configs\n    - block: Zero block driver state before reopening\n    - hw/xen/hvm: Fix Aarch64 typo\n    - hw/net/smc91c111: Don't allow data register access to overrun buffer\n    - hw/net/smc91c111: Sanitize packet length on tx\n    - hw/net/smc91c111: Sanitize packet numbers\n    - hw/net/smc91c111: Ignore attempt to pop from empty RX fifo\n    - ppc/pnv/occ: Fix common area sensor offsets\n    - net: move backend cleanup to NIC cleanup\n    - net: parameterize the removing client from nc list\n    - util/qemu-timer.c: Don't warp timer from timerlist_rearm()\n    - target/arm: Correct STRD atomicity\n    - target/arm: Correct LDRD atomicity and fault behaviour\n","id":"SUSE-SU-2026:20038-1","modified":"2026-01-06T11:41:24Z","published":"2026-01-06T11:41:24Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620038-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240157"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253002"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-11234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-12464"}],"related":["CVE-2025-11234","CVE-2025-12464"],"summary":"Security update for qemu","upstream":["CVE-2025-11234","CVE-2025-12464"]}