Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.2
OpenShift Container Platform 4.19.25 security update affects authentication
RHSA-2026:3391
Summary
Critical security updates are available for OpenShift Container Platform 4.19.25, which includes fixes for a potential authentication bypass vulnerability. This update affects users who rely on OpenShift for secure containerized application deployments. To ensure security, apply the latest updates as soon as possible.
What to do
- Update redhat buildah to version 2:1.33.12-4.rhaos4.19.el9.
- Update redhat buildah-debuginfo to version 2:1.33.12-4.rhaos4.19.el9.
- Update redhat buildah-debugsource to version 2:1.33.12-4.rhaos4.19.el9.
- Update redhat buildah-tests to version 2:1.33.12-4.rhaos4.19.el9.
- Update redhat buildah-tests-debuginfo to version 2:1.33.12-4.rhaos4.19.el9.
- Update redhat runc to version 4:1.2.5-4.rhaos4.19.el9.
- Update redhat runc-debuginfo to version 4:1.2.5-4.rhaos4.19.el9.
- Update redhat runc-debugsource to version 4:1.2.5-4.rhaos4.19.el9.
- Update redhat skopeo to version 2:1.18.1-4.rhaos4.19.el9.
- Update redhat skopeo-debuginfo to version 2:1.18.1-4.rhaos4.19.el9.
- Update redhat skopeo-debugsource to version 2:1.18.1-4.rhaos4.19.el9.
- Update redhat skopeo-tests to version 2:1.18.1-4.rhaos4.19.el9.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | buildah | <= 2:1.33.12-4.rhaos4.19.el9 | 2:1.33.12-4.rhaos4.19.el9 |
| redhat | buildah-debuginfo | <= 2:1.33.12-4.rhaos4.19.el9 | 2:1.33.12-4.rhaos4.19.el9 |
| redhat | buildah-debugsource | <= 2:1.33.12-4.rhaos4.19.el9 | 2:1.33.12-4.rhaos4.19.el9 |
| redhat | buildah-tests | <= 2:1.33.12-4.rhaos4.19.el9 | 2:1.33.12-4.rhaos4.19.el9 |
| redhat | buildah-tests-debuginfo | <= 2:1.33.12-4.rhaos4.19.el9 | 2:1.33.12-4.rhaos4.19.el9 |
| redhat | runc | <= 4:1.2.5-4.rhaos4.19.el9 | 4:1.2.5-4.rhaos4.19.el9 |
| redhat | runc-debuginfo | <= 4:1.2.5-4.rhaos4.19.el9 | 4:1.2.5-4.rhaos4.19.el9 |
| redhat | runc-debugsource | <= 4:1.2.5-4.rhaos4.19.el9 | 4:1.2.5-4.rhaos4.19.el9 |
| redhat | skopeo | <= 2:1.18.1-4.rhaos4.19.el9 | 2:1.18.1-4.rhaos4.19.el9 |
| redhat | skopeo-debuginfo | <= 2:1.18.1-4.rhaos4.19.el9 | 2:1.18.1-4.rhaos4.19.el9 |
| redhat | skopeo-debugsource | <= 2:1.18.1-4.rhaos4.19.el9 | 2:1.18.1-4.rhaos4.19.el9 |
| redhat | skopeo-tests | <= 2:1.18.1-4.rhaos4.19.el9 | 2:1.18.1-4.rhaos4.19.el9 |
Original title
Red Hat Security Advisory: OpenShift Container Platform 4.19.25 packages and security update
osv CVSS3.1
8.2
- https://access.redhat.com/errata/RHSA-2026:3391 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2404715 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434432 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3391.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-52881 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-52881 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-52881 Vendor Advisory
- https://github.com/opencontainers/selinux/pull/237 Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-61726 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61726 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61726 Vendor Advisory
- https://go.dev/cl/736712 Third Party Advisory
- https://go.dev/issue/77101 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4341 Vendor Advisory
Published: 5 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026