{"affected":[{"ecosystem_specific":{"binaries":[{"kubevirt-manifests":"1.7.0-160000.1.1","kubevirt-virtctl":"1.7.0-160000.1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.2","name":"kubevirt","purl":"pkg:rpm/suse/kubevirt&distro=SUSE%20Linux%20Micro%206.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.7.0-160000.1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kubevirt fixes the following issues:\n\nUpdate to version 1.7.0 (bsc#1257128).\n\nSecurity issues fixed:\n\n  - CVE-2025-64435: logic flaw in the virt-controller can lead to incorrect status updates and potentially causing a DoS\n    (bsc#1253189).\n  - CVE-2024-45310: kubevirt vendored github.com/opencontainers/runc/libcontainer/utils: runc can be tricked into\n    creating empty files/directories on host (bsc#1257422).\n  - CVE-2025-22872: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction\n    (bsc#1241772).\n  - CVE-2025-64432: fail to correctly validate certain fields in the client TLS certificate may allow an attacker to\n    bypass existing RBAC controls (bsc#1253181).\n  - CVE-2025-64433: improper symlink handling can allow to read arbitrary files (bsc#1253185).\n  - CVE-2025-64434: compromising virt-handler instance can lead to impersonate virt-api and execute privileged operations\n    (bsc#1253186).\n  - CVE-2025-64437: mishandling of symlinks can lead to compromising the CIA (bsc#1253194).\n  - CVE-2025-64324: a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users\n    (bsc#1253748).\n\nOther updates and bugfixes:\n\n  - Upstream now uses stateless firmware for CoCo VMs.\n","id":"SUSE-SU-2026:20551-1","modified":"2026-02-27T08:49:48Z","published":"2026-02-27T08:49:48Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620551-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253194"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257128"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257422"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64432"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64433"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64434"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64435"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-64437"}],"related":["CVE-2024-45310","CVE-2025-22872","CVE-2025-64324","CVE-2025-64432","CVE-2025-64433","CVE-2025-64434","CVE-2025-64435","CVE-2025-64437"],"summary":"Security update for kubevirt","upstream":["CVE-2024-45310","CVE-2025-22872","CVE-2025-64324","CVE-2025-64432","CVE-2025-64433","CVE-2025-64434","CVE-2025-64435","CVE-2025-64437"]}