Fix Readme
Abstract
This is the documentation for IBM Robotic Process Automation 30.0.0 FP001 (OpenShift Container Platform), including download and installation information and the list of APARs that are resolved in this interim fix.
Content
| Readme file for: | IBM Robotic Process Automation |
|---|---|
| Product Release: | 30.0.0 FP001 |
| Update Name: | 30.0.0 FP001 |
| Publication Date: |
29 August 2025
|
Contents
Components impactedInstalling
List of fixes
Document change history
Components impacted
- IBM Robotic Process Automation
- IBM Robotic Process Automation operator
- IBM Robotic Process Automation operator catalog
Installing
If you installed from Operator Hub
- Your operator will be updated automatically if you have enabled automatic updates. If you have not enabled automatic updates, you will need to manually approve the update in your list of installed operators.
- Check the spec.version field of your RPA custom resource. If you specified 3.0.0, then change this to 3.0.1. If you specified v1, you do not need to do anything.
If you installed via air-gap
- Follow the instructions here: https://www.ibm.com/docs/en/rpa/30.0.x?topic=server-installing-rpa-operator-in-offline-environment and replace the CASE package with the CASE package for this release, which is ibm-robotic-process-automation-3.0.1.tgz
Make sure you use the same bastion host that was previously used to deploy - Follow steps 1 and 2 from the "If you installed from Operator Hub" section above.
List of fixes
APARs are listed in tables, columns are defined as follows:
| Column title | Column description |
| APAR | The fix number |
| Title | A short description of the fix |
| Sec. | A mark indicates a fix related to security |
IBM Robotic Process Automation operator catalog
| APAR | Title | Sec. |
|---|---|---|
| N/A |
IBM Robotic Process Automation delivers container images which include operating system level and other open-source libraries. Security vulnerabilities (CVEs) for these libraries are published regularly.
In this release, additionally to OS level fixes, the following vulnerabilities were addressed:
CVE-2022-40897
CVE-2025-47273
CVE-2025-32414
CVE-2025-48387
CVE-2022-2068
CVE-2025-6545
CVE-2025-6547
CVE-2025-7783
CVE-2024-6345
CVE-2025-5889
CVE-2025-49794
CVE-2025-49796
CVE-2025-22868
RHSA-2025:8655
CVE-2025-22874
|
X |