{"affected":[{"ecosystem_specific":{"binaries":[{"qemu":"8.2.10-slfo.1.1_3.1","qemu-SLOF":"8.2.10-slfo.1.1_3.1","qemu-accel-tcg-x86":"8.2.10-slfo.1.1_3.1","qemu-arm":"8.2.10-slfo.1.1_3.1","qemu-audio-spice":"8.2.10-slfo.1.1_3.1","qemu-block-curl":"8.2.10-slfo.1.1_3.1","qemu-block-iscsi":"8.2.10-slfo.1.1_3.1","qemu-block-nfs":"8.2.10-slfo.1.1_3.1","qemu-block-rbd":"8.2.10-slfo.1.1_3.1","qemu-block-ssh":"8.2.10-slfo.1.1_3.1","qemu-chardev-spice":"8.2.10-slfo.1.1_3.1","qemu-guest-agent":"8.2.10-slfo.1.1_3.1","qemu-headless":"8.2.10-slfo.1.1_3.1","qemu-hw-display-qxl":"8.2.10-slfo.1.1_3.1","qemu-hw-display-virtio-gpu":"8.2.10-slfo.1.1_3.1","qemu-hw-display-virtio-gpu-pci":"8.2.10-slfo.1.1_3.1","qemu-hw-display-virtio-vga":"8.2.10-slfo.1.1_3.1","qemu-hw-usb-host":"8.2.10-slfo.1.1_3.1","qemu-hw-usb-redirect":"8.2.10-slfo.1.1_3.1","qemu-img":"8.2.10-slfo.1.1_3.1","qemu-ipxe":"8.2.10-slfo.1.1_3.1","qemu-ksm":"8.2.10-slfo.1.1_3.1","qemu-lang":"8.2.10-slfo.1.1_3.1","qemu-ppc":"8.2.10-slfo.1.1_3.1","qemu-pr-helper":"8.2.10-slfo.1.1_3.1","qemu-s390x":"8.2.10-slfo.1.1_3.1","qemu-seabios":"8.2.101.16.3_3_ga95067eb-slfo.1.1_3.1","qemu-spice":"8.2.10-slfo.1.1_3.1","qemu-tools":"8.2.10-slfo.1.1_3.1","qemu-ui-opengl":"8.2.10-slfo.1.1_3.1","qemu-ui-spice-core":"8.2.10-slfo.1.1_3.1","qemu-vgabios":"8.2.101.16.3_3_ga95067eb-slfo.1.1_3.1","qemu-x86":"8.2.10-slfo.1.1_3.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"qemu","purl":"pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.2.10-slfo.1.1_3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for qemu fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious\n  guest user to crash the QEMU process on the host (bsc#1253002).\n- CVE-2025-11234: use-after-free in WebSocket handshake operations can be exploited by a malicious client with network\n  access to the VNC WebSocket port to cause a denial-of-service (bsc#1250984).\n  \nOther updates and bugfixes:\n  \n- [openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286).\n- block/curl: fix curl internal handles handling (bsc#1252768).\n\n","id":"SUSE-SU-2026:20008-1","modified":"2025-12-22T15:42:55Z","published":"2025-12-22T15:42:55Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620008-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253002"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-11234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-12464"}],"related":["CVE-2025-11234","CVE-2025-12464"],"summary":"Security update for qemu","upstream":["CVE-2025-11234","CVE-2025-12464"]}