- Issued:
- 2024-09-05
- Updated:
- 2024-09-05
RHBA-2024:6429 - Red Hat Ansible Automation Platform 2.4 Container Release Update
Synopsis
Red Hat Ansible Automation Platform 2.4 Container Release Update
Type/Severity
Bug Fix Advisory None
Topic
An update is now available for Red Hat Ansible Automation Platform 2.4
Description
Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.
Updates and fixes:
- ansible-lightspeed has been updated to 1.0.2
- automation-controller has been updated to 4.5.10
- python39-pulpcore has been updated to 3.28.31
- python39-pulp-ansible has been updated to 0.20.8
- Update ansible.controller collection to 4.5.10 in ee-supported
- Resolve AutomationHub backup failure when LDAP authentication is configured (AAP-21107)
- Fix an issue where ansible-builder fails to create a new execution environment with ee-supported-rhel8 image (AAP-28249)
Solution
Red Hat Ansible Automation Platform
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Ansible Automation Platform | 2.4 | x86_64 |
| Red Hat Ansible Automation Platform | 2.4 | x86_64 |
| Red Hat Ansible Automation Platform | 2.4 | s390x |
| Red Hat Ansible Automation Platform | 2.4 | s390x |
| Red Hat Ansible Automation Platform | 2.4 | ppc64le |
| Red Hat Ansible Automation Platform | 2.4 | ppc64le |
| Red Hat Ansible Automation Platform | 2.4 | aarch64 |
| Red Hat Ansible Automation Platform | 2.4 | aarch64 |
Fixes
(none)
CVEs
- CVE-2020-28241
- CVE-2021-46848
- CVE-2022-36227
- CVE-2022-47629
- CVE-2023-2953
- CVE-2023-3446
- CVE-2023-3817
- CVE-2023-4016
- CVE-2023-5678
- CVE-2023-6004
- CVE-2023-6597
- CVE-2023-6918
- CVE-2023-7104
- CVE-2023-32681
- CVE-2023-37920
- CVE-2024-0450
- CVE-2024-1737
- CVE-2024-1975
- CVE-2024-2398
- CVE-2024-2408
- CVE-2024-3651
- CVE-2024-6345
- CVE-2024-21131
- CVE-2024-21138
- CVE-2024-21140
- CVE-2024-21145
- CVE-2024-21147
- CVE-2024-25062
- CVE-2024-28102
- CVE-2024-28182
- CVE-2024-28834
- CVE-2024-33599
- CVE-2024-33600
- CVE-2024-33601
- CVE-2024-33602
- CVE-2024-34064
- CVE-2024-35195
- CVE-2024-37370
- CVE-2024-37371
- CVE-2024-37891
- CVE-2024-38428
- CVE-2024-39614
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.