Improper Check or Handling of Exceptional Conditions Affecting kubevirt package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL10-KUBEVIRT-13893408
  • published12 Nov 2025
  • disclosed7 Nov 2025

Introduced: 7 Nov 2025

NewCVE-2025-64435  (opens in a new tab)
CWE-703  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:10 kubevirt.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kubevirt package and not the kubevirt package as distributed by RHEL. See How to fix? for RHEL:10 relevant fixed versions and status.

KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.7.0-beta.0, a logic flaw in the virt-controller allows an attacker to disrupt the control over a running VMI by creating a pod with the same labels as the legitimate virt-launcher pod associated with the VMI. This can mislead the virt-controller into associating the fake pod with the VMI, resulting in incorrect status updates and potentially causing a DoS (Denial-of-Service). This vulnerability is fixed in 1.7.0-beta.0.

CVSS Base Scores

version 3.1