Security update for qemu
| Announcement ID: | SUSE-SU-2026:21235-1 |
|---|---|
| Release Date: | 2026-04-20T10:54:30Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves three vulnerabilities and contains one feature can now be installed.
Description:
This update for qemu fixes the following issues:
Update to version 10.0.9.
Security issues fixed:
- CVE-2026-3196: unbounded memory allocation and host denial-of-service via PCM_INFO requests sent from the guest (bsc#1259079).
- CVE-2026-3195: heap out-of-bounds write when reading input audio in the virtio-snd device input callback (bsc#1259080).
- CVE-2026-2243: heap out-of-bounds read and 12-byte information leak when processing specially crafted VMDK files with qemu-img (bsc#1258509).
Other updates and bugfixes:
- Version 10.0.9:
- Full backport list: https://lore.kernel.org/qemu-devel/20260318045608.7E1B513DFF6@think4mjt.localdomain/
- hyperv/syndbg: check length returned by cpu_physical_memory_map()
- fuse: Copy write buffer content before polling
- target/loongarch: Avoid recursive PNX exception on CSR_BADI fetch
- target/loongarch: Preserve PTE permission bits in LDPTE
- hw/net/npcm_gmac: Catch accesses off the end of the register array
- linux-user: fix TIOCGSID ioctl
- tests/tcg/multiarch/test-mmap: Check mmaps beyond reserved_va
- bsd-user: Deal with mmap where start > reserved_va
- linux-user: Deal with mmap where start > reserved_va
- hw/net/xilinx_ethlite: Check for oversized TX packets
- virtio-gpu: Ensure BHs are invoked only from main-loop thread
- block/nfs: Do not enter coroutine from CB
- block: Never drop BLOCK_IO_ERROR with action=stop for rate limiting
- block/throttle-groups: fix deadlock with iolimits and muliple iothreads
- mirror: Fix missed dirty bitmap writes during startup
- block/curl: fix concurrent completion handling
- block/vmdk: fix OOB read in vmdk_read_extent()
- hw/net/smc91c111: Don't allow negative-length packets
- io: fix cleanup for websock I/O source data on cancellation
- io: fix cleanup for TLS I/O source data on cancellation
- io: separate freeing of tasks from marking them as complete
- target/i386/hvf/x86_mmu: Fix compiler warning
- hw/i386/vmmouse: Fix hypercall clobbers
- tests/docker: upgrade most non-lcitool debian tests to debian 13
- hw/9pfs: fix missing EOPNOTSUPP on Twstat and Trenameat for fs synth driver
-
hw/9pfs: fix data race in v9fs_mark_fids_unreclaim()
-
Add support for AMD-Turn CPUs (jsc#PED-13174)
- target/i386: Add support for EPYC-Turin model (jsc#PED-13174)
- target/i386: Update EPYC-Genoa for Cache property, perfmon-v2, RAS and SVM feature bits (jsc#PED-13174)
- target/i386: Add couple of feature bits in CPUID_Fn80000021_EAX (jsc#PED-13174)
- target/i386: Update EPYC-Milan CPU model for Cache property, RAS, SVM feature bits (jsc#PED-13174)
- target/i386: Update EPYC-Rome CPU model for Cache property, RAS, SVM feature bits (jsc#PED-13174)
- target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits (jsc#PED-13174)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.2
zypper in -t patch SUSE-SL-Micro-6.2-591=1
Package List:
-
SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
- qemu-block-ssh-debuginfo-10.0.9-160000.1.1
- qemu-hw-display-virtio-vga-10.0.9-160000.1.1
- qemu-hw-display-virtio-vga-debuginfo-10.0.9-160000.1.1
- qemu-audio-spice-10.0.9-160000.1.1
- qemu-tools-10.0.9-160000.1.1
- qemu-ui-opengl-debuginfo-10.0.9-160000.1.1
- qemu-hw-display-virtio-gpu-debuginfo-10.0.9-160000.1.1
- qemu-guest-agent-debuginfo-10.0.9-160000.1.1
- qemu-pr-helper-debuginfo-10.0.9-160000.1.1
- qemu-debuginfo-10.0.9-160000.1.1
- qemu-ui-spice-core-10.0.9-160000.1.1
- qemu-img-10.0.9-160000.1.1
- qemu-hw-usb-redirect-10.0.9-160000.1.1
- qemu-tools-debuginfo-10.0.9-160000.1.1
- qemu-audio-spice-debuginfo-10.0.9-160000.1.1
- qemu-hw-display-virtio-gpu-10.0.9-160000.1.1
- qemu-block-iscsi-debuginfo-10.0.9-160000.1.1
- qemu-chardev-spice-debuginfo-10.0.9-160000.1.1
- qemu-img-debuginfo-10.0.9-160000.1.1
- qemu-hw-usb-redirect-debuginfo-10.0.9-160000.1.1
- qemu-ksm-10.0.9-160000.1.1
- qemu-hw-display-virtio-gpu-pci-10.0.9-160000.1.1
- qemu-hw-display-qxl-10.0.9-160000.1.1
- qemu-ui-spice-core-debuginfo-10.0.9-160000.1.1
- qemu-guest-agent-10.0.9-160000.1.1
- qemu-ui-opengl-10.0.9-160000.1.1
- qemu-block-iscsi-10.0.9-160000.1.1
- qemu-debugsource-10.0.9-160000.1.1
- qemu-hw-display-virtio-gpu-pci-debuginfo-10.0.9-160000.1.1
- qemu-pr-helper-10.0.9-160000.1.1
- qemu-hw-usb-host-10.0.9-160000.1.1
- qemu-10.0.9-160000.1.1
- qemu-hw-usb-host-debuginfo-10.0.9-160000.1.1
- qemu-hw-display-qxl-debuginfo-10.0.9-160000.1.1
- qemu-block-ssh-10.0.9-160000.1.1
- qemu-chardev-spice-10.0.9-160000.1.1
-
SUSE Linux Micro 6.2 (noarch)
- qemu-seabios-10.0.91.16.3_3_g3d33c746-160000.1.1
- qemu-vgabios-10.0.91.16.3_3_g3d33c746-160000.1.1
- qemu-SLOF-10.0.9-160000.1.1
- qemu-lang-10.0.9-160000.1.1
- qemu-ipxe-10.0.9-160000.1.1
-
SUSE Linux Micro 6.2 (x86_64)
- qemu-x86-10.0.9-160000.1.1
- qemu-vmsr-helper-10.0.9-160000.1.1
- qemu-vmsr-helper-debuginfo-10.0.9-160000.1.1
- qemu-x86-debuginfo-10.0.9-160000.1.1
-
SUSE Linux Micro 6.2 (aarch64)
- qemu-arm-debuginfo-10.0.9-160000.1.1
- qemu-arm-10.0.9-160000.1.1
-
SUSE Linux Micro 6.2 (ppc64le)
- qemu-ppc-debuginfo-10.0.9-160000.1.1
- qemu-ppc-10.0.9-160000.1.1
-
SUSE Linux Micro 6.2 (s390x)
- qemu-s390x-10.0.9-160000.1.1
- qemu-hw-s390x-virtio-gpu-ccw-debuginfo-10.0.9-160000.1.1
- qemu-s390x-debuginfo-10.0.9-160000.1.1
- qemu-hw-s390x-virtio-gpu-ccw-10.0.9-160000.1.1
References:
- https://www.suse.com/security/cve/CVE-2026-2243.html
- https://www.suse.com/security/cve/CVE-2026-3195.html
- https://www.suse.com/security/cve/CVE-2026-3196.html
- https://bugzilla.suse.com/show_bug.cgi?id=1258509
- https://bugzilla.suse.com/show_bug.cgi?id=1259079
- https://bugzilla.suse.com/show_bug.cgi?id=1259080
- https://jira.suse.com/browse/PED-13174