{"affected":[{"ecosystem_specific":{"binaries":[{"kubevirt-container-disk":"1.7.0-160000.1.1","kubevirt-manifests":"1.7.0-160000.1.1","kubevirt-pr-helper-conf":"1.7.0-160000.1.1","kubevirt-sidecar-shim":"1.7.0-160000.1.1","kubevirt-tests":"1.7.0-160000.1.1","kubevirt-virt-api":"1.7.0-160000.1.1","kubevirt-virt-controller":"1.7.0-160000.1.1","kubevirt-virt-exportproxy":"1.7.0-160000.1.1","kubevirt-virt-exportserver":"1.7.0-160000.1.1","kubevirt-virt-handler":"1.7.0-160000.1.1","kubevirt-virt-launcher":"1.7.0-160000.1.1","kubevirt-virt-operator":"1.7.0-160000.1.1","kubevirt-virt-synchronization-controller":"1.7.0-160000.1.1","kubevirt-virtctl":"1.7.0-160000.1.1","obs-service-kubevirt_containers_meta":"1.7.0-160000.1.1"}]},"package":{"ecosystem":"openSUSE:Leap 16.0","name":"kubevirt","purl":"pkg:rpm/opensuse/kubevirt&distro=openSUSE%20Leap%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.7.0-160000.1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kubevirt fixes the following issues:\n\nUpdate to version 1.7.0 (bsc#1257128).\n\nSecurity issues fixed:\n\n  - CVE-2025-64435: logic flaw in the virt-controller can lead to incorrect status updates and potentially causing a DoS\n    (bsc#1253189).\n  - CVE-2024-45310: kubevirt vendored github.com/opencontainers/runc/libcontainer/utils: runc can be tricked into\n    creating empty files/directories on host (bsc#1257422).\n  - CVE-2025-22872: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction\n    (bsc#1241772).\n  - CVE-2025-64432: fail to correctly validate certain fields in the client TLS certificate may allow an attacker to\n    bypass existing RBAC controls (bsc#1253181).\n  - CVE-2025-64433: improper symlink handling can allow to read arbitrary files (bsc#1253185).\n  - CVE-2025-64434: compromising virt-handler instance can lead to impersonate virt-api and execute privileged operations\n    (bsc#1253186).\n  - CVE-2025-64437: mishandling of symlinks can lead to compromising the CIA (bsc#1253194).\n  - CVE-2025-64324: a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users\n    (bsc#1253748).\n\nOther updates and bugfixes:\n\n  - Upstream now uses stateless firmware for CoCo VMs.\n","id":"openSUSE-SU-2026:20281-1","modified":"2026-02-27T08:51:11Z","published":"2026-02-27T08:51:11Z","references":[{"type":"ADVISORY","url":null},{"type":"REPORT","url":"https://bugzilla.suse.com/1241772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253194"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257128"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257422"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64432"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64433"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64434"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64435"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64437"}],"related":["CVE-2024-45310","CVE-2025-22872","CVE-2025-64324","CVE-2025-64432","CVE-2025-64433","CVE-2025-64434","CVE-2025-64435","CVE-2025-64437"],"summary":"Security update for kubevirt","upstream":["CVE-2024-45310","CVE-2025-22872","CVE-2025-64324","CVE-2025-64432","CVE-2025-64433","CVE-2025-64434","CVE-2025-64435","CVE-2025-64437"]}