VYPR

rpm package

suse/kubevirt&distro=SUSE Linux Enterprise Module for Containers 15 SP7

pkg:rpm/suse/kubevirt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP7

Vulnerabilities (10)

  • CVE-2025-64324Nov 18, 2025
    affected < 1.6.3-150700.3.13.1fixed 1.6.3-150700.3.13.1

    KubeVirt is a virtual machine management add-on for Kubernetes. The `hostDisk` feature in KubeVirt allows mounting a host file or directory owned by the user with UID 107 into a VM. However, prior to version 1.6.1 and 1.7.0, the implementation of this feature and more specificall

  • CVE-2025-64433Nov 7, 2025
    affected < 1.6.3-150700.3.13.1fixed 1.6.3-150700.3.13.1

    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, a vulnerability was discovered that allows a VM to read arbitrary files from the virt-launcher pod's file system. This issue stems from improper symlink handling when mounting PVC disks into

  • CVE-2025-64437Nov 7, 2025
    affected < 1.6.3-150700.3.13.1fixed 1.6.3-150700.3.13.1

    KubeVirt is a virtual machine management add-on for Kubernetes. In versions before 1.5.3 and 1.6.1, the virt-handler does not verify whether the launcher-sock is a symlink or a regular file. This oversight can be exploited, for example, to change the ownership of arbitrary files

  • CVE-2025-64435Nov 7, 2025
    affected < 1.7.0-150700.3.16.2fixed 1.7.0-150700.3.16.2

    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.7.0-beta.0, a logic flaw in the virt-controller allows an attacker to disrupt the control over a running VMI by creating a pod with the same labels as the legitimate virt-launcher pod associated with the V

  • CVE-2025-64434Nov 7, 2025
    affected < 1.6.3-150700.3.13.1fixed 1.6.3-150700.3.13.1

    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, due to the peer verification logic in virt-handler (via verifyPeerCert), an attacker who compromises a virt-handler instance, could exploit these shared credentials to impersonate virt-api a

  • CVE-2025-64432Nov 7, 2025
    affected < 1.6.3-150700.3.13.1fixed 1.6.3-150700.3.13.1

    KubeVirt is a virtual machine management add-on for Kubernetes. Versions 1.5.3 and below, and 1.6.0 contained a flawed implementation of the Kubernetes aggregation layer's authentication flow which could enable bypass of RBAC controls. It was discovered that the virt-api componen

  • CVE-2025-22872MedApr 16, 2025
    affected < 1.6.3-150700.3.13.1fixed 1.6.3-150700.3.13.1

    The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can resul

  • CVE-2024-45338MedDec 18, 2024
    affected < 1.5.2-150700.3.5.2fixed 1.5.2-150700.3.5.2

    An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

  • CVE-2024-45337CriDec 12, 2024
    affected < 1.5.2-150700.3.5.2fixed 1.5.2-150700.3.5.2

    Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that

  • CVE-2024-45310Sep 3, 2024
    affected < 1.7.0-150700.3.16.2fixed 1.7.0-150700.3.16.2

    runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between