Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.5
Red Hat Ansible Automation Platform 2.5 has security and bug fixes
RHSA-2026:3959
Summary
Red Hat Ansible Automation Platform 2.5 has received security and bug fixes. This update is recommended to ensure your automation platform remains secure and stable. To protect your system, apply the latest update as soon as possible.
What to do
- Update redhat python3.12-django to version 0:4.2.28-1.el8ap.
- Update redhat python3.12-django to version 0:4.2.28-1.el9ap.
- Update redhat receptor to version 0:1.6.3-4.el8ap.
- Update redhat receptor-debuginfo to version 0:1.6.3-4.el8ap.
- Update redhat receptor-debugsource to version 0:1.6.3-4.el8ap.
- Update redhat receptorctl to version 0:1.6.3-4.el8ap.
- Update redhat receptor to version 0:1.6.3-4.el9ap.
- Update redhat receptor-debuginfo to version 0:1.6.3-4.el9ap.
- Update redhat receptor-debugsource to version 0:1.6.3-4.el9ap.
- Update redhat receptorctl to version 0:1.6.3-4.el9ap.
- Update redhat python3.12-aiohttp to version 0:3.13.3-2.el8ap.
- Update redhat python3.12-aiohttp-debuginfo to version 0:3.13.3-2.el8ap.
- Update redhat python3.12-aiohttp-debugsource to version 0:3.13.3-2.el8ap.
- Update redhat python3.12-aiohttp to version 0:3.13.3-2.el9ap.
- Update redhat python3.12-aiohttp-debuginfo to version 0:3.13.3-2.el9ap.
- Update redhat python3.12-aiohttp-debugsource to version 0:3.13.3-2.el9ap.
- Update redhat python3.12-protobuf to version 0:5.29.6-1.el8ap.
- Update redhat python3.12-protobuf-debuginfo to version 0:5.29.6-1.el8ap.
- Update redhat python3.12-protobuf-debugsource to version 0:5.29.6-1.el8ap.
- Update redhat python3.12-protobuf to version 0:5.29.6-1.el9ap.
- Update redhat python3.12-protobuf-debuginfo to version 0:5.29.6-1.el9ap.
- Update redhat python3.12-protobuf-debugsource to version 0:5.29.6-1.el9ap.
- Update redhat automation-gateway to version 0:2.5.20260225-1.el8ap.
- Update redhat automation-gateway-config to version 0:2.5.20260225-1.el8ap.
- Update redhat automation-gateway-server to version 0:2.5.20260225-1.el8ap.
- Update redhat automation-gateway to version 0:2.5.20260225-1.el9ap.
- Update redhat automation-gateway-config to version 0:2.5.20260225-1.el9ap.
- Update redhat automation-gateway-server to version 0:2.5.20260225-1.el9ap.
- Update redhat automation-controller to version 0:4.6.26-1.el8ap.
- Update redhat automation-controller-cli to version 0:4.6.26-1.el8ap.
- Update redhat automation-controller-server to version 0:4.6.26-1.el8ap.
- Update redhat automation-controller-ui to version 0:4.6.26-1.el8ap.
- Update redhat automation-controller-venv-tower to version 0:4.6.26-1.el8ap.
- Update redhat automation-controller to version 0:4.6.26-1.el9ap.
- Update redhat automation-controller-cli to version 0:4.6.26-1.el9ap.
- Update redhat automation-controller-server to version 0:4.6.26-1.el9ap.
- Update redhat automation-controller-ui to version 0:4.6.26-1.el9ap.
- Update redhat automation-controller-venv-tower to version 0:4.6.26-1.el9ap.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | python3.12-django | <= 0:4.2.28-1.el8ap | 0:4.2.28-1.el8ap |
| redhat | python3.12-django | <= 0:4.2.28-1.el8ap | 0:4.2.28-1.el8ap |
| redhat | python3.12-django | <= 0:4.2.28-1.el9ap | 0:4.2.28-1.el9ap |
| redhat | python3.12-django | <= 0:4.2.28-1.el9ap | 0:4.2.28-1.el9ap |
| redhat | receptor | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptor-debuginfo | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptor-debugsource | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptorctl | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptor | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptor-debuginfo | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptor-debugsource | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptorctl | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptor | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptor-debuginfo | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptor-debugsource | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptorctl | <= 0:1.6.3-4.el8ap | 0:1.6.3-4.el8ap |
| redhat | receptor | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptor-debuginfo | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptor-debugsource | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptorctl | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptor | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptor-debuginfo | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptor-debugsource | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptorctl | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptor | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptor-debuginfo | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptor-debugsource | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | receptorctl | <= 0:1.6.3-4.el9ap | 0:1.6.3-4.el9ap |
| redhat | python3.12-aiohttp | <= 0:3.13.3-2.el8ap | 0:3.13.3-2.el8ap |
| redhat | python3.12-aiohttp-debuginfo | <= 0:3.13.3-2.el8ap | 0:3.13.3-2.el8ap |
| redhat | python3.12-aiohttp-debugsource | <= 0:3.13.3-2.el8ap | 0:3.13.3-2.el8ap |
| redhat | python3.12-aiohttp | <= 0:3.13.3-2.el9ap | 0:3.13.3-2.el9ap |
| redhat | python3.12-aiohttp-debuginfo | <= 0:3.13.3-2.el9ap | 0:3.13.3-2.el9ap |
| redhat | python3.12-aiohttp-debugsource | <= 0:3.13.3-2.el9ap | 0:3.13.3-2.el9ap |
| redhat | python3.12-protobuf | <= 0:5.29.6-1.el8ap | 0:5.29.6-1.el8ap |
| redhat | python3.12-protobuf-debuginfo | <= 0:5.29.6-1.el8ap | 0:5.29.6-1.el8ap |
| redhat | python3.12-protobuf-debugsource | <= 0:5.29.6-1.el8ap | 0:5.29.6-1.el8ap |
| redhat | python3.12-protobuf | <= 0:5.29.6-1.el9ap | 0:5.29.6-1.el9ap |
| redhat | python3.12-protobuf-debuginfo | <= 0:5.29.6-1.el9ap | 0:5.29.6-1.el9ap |
| redhat | python3.12-protobuf-debugsource | <= 0:5.29.6-1.el9ap | 0:5.29.6-1.el9ap |
| redhat | automation-gateway | <= 0:2.5.20260225-1.el8ap | 0:2.5.20260225-1.el8ap |
| redhat | automation-gateway-config | <= 0:2.5.20260225-1.el8ap | 0:2.5.20260225-1.el8ap |
| redhat | automation-gateway-server | <= 0:2.5.20260225-1.el8ap | 0:2.5.20260225-1.el8ap |
| redhat | automation-gateway | <= 0:2.5.20260225-1.el9ap | 0:2.5.20260225-1.el9ap |
| redhat | automation-gateway-config | <= 0:2.5.20260225-1.el9ap | 0:2.5.20260225-1.el9ap |
| redhat | automation-gateway-server | <= 0:2.5.20260225-1.el9ap | 0:2.5.20260225-1.el9ap |
| redhat | automation-controller | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller-cli | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller-server | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller-ui | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller-venv-tower | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller-cli | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller-server | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller-ui | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller-venv-tower | <= 0:4.6.26-1.el8ap | 0:4.6.26-1.el8ap |
| redhat | automation-controller | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
| redhat | automation-controller-cli | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
| redhat | automation-controller-server | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
| redhat | automation-controller-ui | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
| redhat | automation-controller-venv-tower | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
| redhat | automation-controller | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
| redhat | automation-controller-cli | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
| redhat | automation-controller-server | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
| redhat | automation-controller-ui | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
| redhat | automation-controller-venv-tower | <= 0:4.6.26-1.el9ap | 0:4.6.26-1.el9ap |
Original title
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update
osv CVSS3.1
8.5
- https://access.redhat.com/errata/RHSA-2026:3959 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5... Third Party Advisory
- https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5... Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2427456 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2428412 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2430472 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2431959 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2432398 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436338 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436339 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436340 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436341 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436342 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3959.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-14550 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-14550 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-14550 Vendor Advisory
- https://docs.djangoproject.com/en/dev/releases/security/ Third Party Advisory
- https://groups.google.com/g/django-announce Third Party Advisory
- https://www.djangoproject.com/weblog/2026/feb/03/security-releases/ Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-61726 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61726 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61726 Vendor Advisory
- https://go.dev/cl/736712 Third Party Advisory
- https://go.dev/issue/77101 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4341 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-69223 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-69223 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-69223 Vendor Advisory
- https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c91... Third Party Advisory
- https://github.com/aio-libs/aiohttp/security/advisories/GHSA-6mq8-rvhq-8wgg Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-0994 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-0994 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0994 Vendor Advisory
- https://github.com/protocolbuffers/protobuf/pull/25239 Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-1207 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-1207 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-1207 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-1285 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-1285 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-1285 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-1287 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-1287 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-1287 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-1312 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-1312 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-1312 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-22029 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-22029 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-22029 Vendor Advisory
- https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvj... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23490 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23490 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23490 Vendor Advisory
- https://github.com/pyasn1/pyasn1/commit/3908f144229eed4df24bd569d16e5991ace44970 Third Party Advisory
- https://github.com/pyasn1/pyasn1/releases/tag/v0.6.2 Third Party Advisory
- https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-24049 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-24049 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-24049 Vendor Advisory
- https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef Third Party Advisory
- https://github.com/pypa/wheel/releases/tag/0.46.2 Third Party Advisory
- https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx Third Party Advisory
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 8 Mar 2026