qemu - Universal CPU emulator

Property Value
Distribution openSUSE Leap 42.3
Repository openSUSE Update Oss all
Package name qemu
Package version 2.9.1
Package release 44.1
Package architecture x86_64
Package type rpm
Installed size 2.11 MB
Download size 575.15 KB
Official Mirror ftp.gwdg.de
QEMU is an extremely well-performing CPU emulator that allows you to
choose between simulating an entire system and running userspace
binaries for different architectures under your native operating
system. It currently emulates x86, ARM, PowerPC and SPARC CPUs as well
as PC and PowerMac systems.


Package Version Architecture Repository
qemu-2.9.1-47.1.x86_64.rpm 2.9.1 x86_64 openSUSE Update Oss
qemu-2.9.1-41.1.x86_64.rpm 2.9.1 x86_64 openSUSE Update Oss
qemu-2.9.1-38.1.x86_64.rpm 2.9.1 x86_64 openSUSE Update Oss
qemu-2.9.1-35.1.x86_64.rpm 2.9.1 x86_64 openSUSE Update Oss
qemu-2.9.0-32.4.x86_64.rpm 2.9.0 x86_64 openSUSE Update Oss
qemu-2.9.0-30.1.x86_64.rpm 2.9.0 x86_64 openSUSE Oss
qemu - - -


Name Value
/usr/bin/python -
acl -
coreutils -
shadow -
systemd -
udev -


Name Value
qemu = 2.9.1-44.1
qemu(x86-64) = 2.9.1-44.1


Type URL
Binary Package qemu-2.9.1-44.1.x86_64.rpm
Source Package qemu-2.9.1-44.1.src.rpm

Install Howto

Install qemu rpm package:

# zypper install qemu




2018-05-14 - brogers@suse.com
- Spectre v4 vulnerability mitigation support for KVM guests.
High level description of vulnerability: Systems with microprocessors
utilizing speculative execution and speculative execution of memory
reads before the addresses of all prior memory writes are known may
allow unauthorized disclosure of information to an attacker with
local user access via a side-channel analysis.
This patch permits the new x86 cpu feature flag named "ssbd" to be
presented to the guest, given that the host has this feature, and
KVM exposes it to the guest as well. As this change also relies on
the same MSR infrastructure used for the "spec-ctrl" feature now is
a good time to remove the temporary patch used to help ensure a
smooth transition to spec-ctrl support regardless of KVM support.
For this feature to be enabled, via adding it to the qemu commandline
(eg: -cpu <model>,+spec-ctrl,+ssbd), so the guest OS can take advantage
of the feature, spec-ctrl and ssbd support is also required in the host.
(CVE-2018-3639 bsc#1092885)
* Patches dropped:
* Patches added:
- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE12-SP3
2018-04-04 - lyan@suse.com
- Add new look up path "sys/class/tpm" for tpm cancel path based
on Linux 4.0 change (commit 313d21eeab9282e)(bsc#1070615)
2018-03-09 - brogers@suse.com
- This update has the next round of Spectre v2 related patches,
which now integrates with corresponding changes in libvirt. A
January 2018 release of qemu initially addressed the Spectre v2
vulnerability for KVM guests by exposing the spec-ctrl feature
for all x86 vcpu types, which was the quick and dirty approach,
but not the proper solution. We remove that initial patch and now
rely on patches from upstream. This update defines spec_ctrl and
ibpb cpu feature flags as well as new cpu models which are clones
of existing models with either -IBRS or -IBPB added to the end of
the model name. These new vcpu models explicitly include the new
feature(s), whereas the feature flags can be added to the cpu
parameter as with other features. In short, for continued Spectre
v2 protection, ensure that either the appropriate cpu feature
flag is added to the QEMU command-line, or one of the new cpu
models is used. Although migration from older versions is
supported, the new cpu features won't be properly exposed to the
guest until it is restarted with the cpu features explicitly
added. A reboot is insufficient.
- A warning patch is added which attempts to detect a migration
from a qemu version which had the quick and dirty fix (it only
detects certain cases, but hopefully is helpful.)
For additional information on Spectre v2 as it relates to QEMU,
see: https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/
(CVE-2017-5715 bsc#1068032)
- A patch is added to continue to detect Spectre v2 mitigation
features (as shown by cpuid), and if found provide that feature
to guests, even if running on older KVM (kernel) versions which
do not yet expose that feature to QEMU. (bsc#1082276)
These two patches will be removed when we can reasonably assume
everyone is running with the appropriate updates.
* Patches dropped:
* Patches added:
- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE12-SP3

See Also

Package Description
qemu-arm-2.9.0-32.4.x86_64.rpm Universal CPU emulator -- ARM
qemu-arm-2.9.1-35.1.x86_64.rpm Universal CPU emulator -- ARM
qemu-arm-2.9.1-38.1.x86_64.rpm Universal CPU emulator -- ARM
qemu-arm-2.9.1-41.1.x86_64.rpm Universal CPU emulator -- ARM
qemu-arm-2.9.1-44.1.x86_64.rpm Universal CPU emulator -- ARM
qemu-arm-2.9.1-47.1.x86_64.rpm Universal CPU emulator -- ARM
qemu-block-curl-2.9.0-32.4.x86_64.rpm Universal CPU emulator -- cURL block support
qemu-block-curl-2.9.1-35.1.x86_64.rpm Universal CPU emulator -- cURL block support
qemu-block-curl-2.9.1-38.1.x86_64.rpm Universal CPU emulator -- cURL block support
qemu-block-curl-2.9.1-41.1.x86_64.rpm Universal CPU emulator -- cURL block support
qemu-block-curl-2.9.1-44.1.x86_64.rpm Universal CPU emulator -- cURL block support
qemu-block-curl-2.9.1-47.1.x86_64.rpm Universal CPU emulator -- cURL block support
qemu-block-dmg-2.9.0-32.4.x86_64.rpm Universal CPU emulator -- DMG block support
qemu-block-dmg-2.9.1-35.1.x86_64.rpm Universal CPU emulator -- DMG block support
qemu-block-dmg-2.9.1-38.1.x86_64.rpm Universal CPU emulator -- DMG block support