Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t
| Announcement ID: | SUSE-SU-2025:4330-1 |
|---|---|
| Release Date: | 2025-12-09T11:34:00Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves six vulnerabilities and has two security fixes can now be installed.
Description:
This update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container fixes the following issues:
Updated kubevirt to version 1.6.3:
- CVE-2025-22872: Fixed incorrect interpretation of tags leading content to be placed wrong scope during DOM construction in golang.org/x/net/html (bsc#1241772)
- CVE-2025-64432: Fixed bypass of RBAC controls due to incorrect validation of certain fields in the client TLS certificate (bsc#1253181)
- CVE-2025-64433: Fixed arbitrary files read via improper symlink handling (bsc#1253185)
- CVE-2025-64434: Fixed privilege escalation via virt-api impersonification due to compromise virt-handler instance (bsc#1253186)
- CVE-2025-64437: Fixed mishandling of symlinks (bsc#1253194)
- CVE-2025-64324: Fixed a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users (bsc#1253748)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-4330=1
Package List:
-
Containers Module 15-SP7 (aarch64 x86_64)
- kubevirt-virtctl-debuginfo-1.6.3-150700.3.13.1
- kubevirt-virtctl-1.6.3-150700.3.13.1
- kubevirt-manifests-1.6.3-150700.3.13.1
References:
- https://www.suse.com/security/cve/CVE-2025-22872.html
- https://www.suse.com/security/cve/CVE-2025-64324.html
- https://www.suse.com/security/cve/CVE-2025-64432.html
- https://www.suse.com/security/cve/CVE-2025-64433.html
- https://www.suse.com/security/cve/CVE-2025-64434.html
- https://www.suse.com/security/cve/CVE-2025-64437.html
- https://bugzilla.suse.com/show_bug.cgi?id=1241772
- https://bugzilla.suse.com/show_bug.cgi?id=1250683
- https://bugzilla.suse.com/show_bug.cgi?id=1253181
- https://bugzilla.suse.com/show_bug.cgi?id=1253185
- https://bugzilla.suse.com/show_bug.cgi?id=1253186
- https://bugzilla.suse.com/show_bug.cgi?id=1253194
- https://bugzilla.suse.com/show_bug.cgi?id=1253384
- https://bugzilla.suse.com/show_bug.cgi?id=1253748