Fix Readme
Abstract
This is the documentation for IBM Robotic Process Automation 23.0.20 (OpenShift Container Platform), including download and installation information and the list of APARs that are resolved in this interim fix.
Content
| Readme file for: | IBM Robotic Process Automation |
|---|---|
| Product Release: | 23.0.20 |
| Update Name: | 23.0.20 |
| Publication Date: |
7 January 2024
|
Contents
Components impactedInstalling
List of fixes
Document change history
Components impacted
- IBM Robotic Process Automation
- IBM Robotic Process Automation operator
- IBM Robotic Process Automation operator catalog
Installing
If you installed from Operator Hub
- Your operator will be updated automatically if you have enabled automatic updates. If you have not enabled automatic updates, you will need to manually approve the update in your list of installed operators.
- Check the spec.version field of your RPA custom resource. If you specified 2.2.0, then change this to 2.3.0. If you specified v1, you do not need to do anything.
If you installed via air-gap
- Follow the instructions here: https://www.ibm.com/docs/en/rpa/23.0?topic=operator-installing-rpa-in-offline-environment and replace the CASE package with the CASE package for this release, which is ibm-robotic-process-automation-2.3.0.tgz
Make sure you use the same bastion host that was previously used to deploy - Follow steps 1 and 2 from the "If you installed from Operator Hub" section above.
List of fixes
APARs are listed in tables, columns are defined as follows:
| Column title | Column description |
| APAR | The fix number |
| Title | A short description of the fix |
| Sec. | A mark indicates a fix related to security |
IBM Robotic Process Automation operator catalog
| APAR | Title | Sec. |
|---|---|---|
| N/A |
IBM Robotic Process Automation delivers container images which include operating system level and other open-source libraries. Security vulnerabilities (CVEs) for these libraries are published regularly.
In this release, additionally to OS level fixes, the following vulnerabilities were addressed:
CVE-2024-26462
CVE-2024-49767 CVE-2024-6232 CVE-2024-49766 CVE-2024-4603 CVE-2023-6237 CVE-2024-47554 CVE-2024-9287 CVE-2024-10041 CVE-2024-7006 CVE-2024-26458 CVE-2024-26461 |
X |