- Issued:
- 2024-09-24
- Updated:
- 2024-09-24
RHBA-2024:7006 - Bug Fix Advisory
Synopsis
Migration Toolkit for Applications bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
Migration Toolkit for Applications 7.1.1 release
Description
Migration Toolkit for Applications 7.1.1 Images
Affected Products
- Red Hat Migration Toolkit for Applications 1 x86_64
Fixes
- MTA-2678 - [Assessment Reports] Need separate charts for unassessed apps and apps with unknown risk
- MTA-2795 - [Analysis Wizard] options step: OpenJDK target is duplicated in the target list
- MTA-3133 - [Kantra CLI] Container name consists of random letters
- MTA-3171 - [CLI] The issue is empty running analysis using Python application
- MTA-3195 - Enable Premption in Task Manager is not working
- MTA-3220 - Redundant 'View all tasks' link on Task queue
- MTA-3288 - [Insights] Missing data upon clicking Insights issue in static report
- MTA-3321 - Application Inventory drop down selection doesnt close or respond to additional clicks
- MTA-3322 - [UI] Selection dropdown in app inventory doesn't disappear
- MTA-3330 - Custom target doesn't use configured rules when specified via git repo
- MTA-3437 - [UI] Custom Target Not Listed in Options Tab
- MTA-3452 - [Intellij] [IDE] unable to cancel analysis on "heavy" applications
- MTA-3515 - [Analysis Wizard] When uploading a binary, all targets should be shown.
- MTA-3543 - [UI] Language selection dropdown looks corrupted when scrolling window
- MTA-3594 - MacOS .NET analysis fails if I provide --rules (this works on linux)
- MTA-3626 - [CLI] Container continues to run analysis if binary is interrupted by CTRL+C
- MTA-3651 - [Task manager drawer] "Quota Blocked" tasks are not listed
- MTA-3654 - [Analyisis] Binary analysis effort of tackle-testapp-public is 0
- MTA-3663 - [CLI] Bulk analysis is failing to generate static report with file not found error
- MTA-3700 - kitchensink.war analysis is failing
- MTA-3779 - [CLI] MTA CLI fails to analyze dependencies on private repo even when a settings file is provided
CVEs
- CVE-2023-52463
- CVE-2023-52801
- CVE-2024-1737
- CVE-2024-1975
- CVE-2024-2398
- CVE-2024-6345
- CVE-2024-6923
- CVE-2024-26629
- CVE-2024-26630
- CVE-2024-26720
- CVE-2024-26886
- CVE-2024-26946
- CVE-2024-34397
- CVE-2024-35791
- CVE-2024-35797
- CVE-2024-35875
- CVE-2024-36000
- CVE-2024-36019
- CVE-2024-36883
- CVE-2024-36979
- CVE-2024-37370
- CVE-2024-37371
- CVE-2024-37891
- CVE-2024-38167
- CVE-2024-38428
- CVE-2024-38559
- CVE-2024-38619
- CVE-2024-39331
- CVE-2024-40927
- CVE-2024-40936
- CVE-2024-41040
- CVE-2024-41044
- CVE-2024-41055
- CVE-2024-41073
- CVE-2024-41096
- CVE-2024-42082
- CVE-2024-42096
- CVE-2024-42102
- CVE-2024-42131
References
(none)
aarch64
mta/mta-cli-rhel9@sha256:2bfdef57b6e319db3893ea8ae7d278f9b4a5d04a1ddf64e88b279f95278ada90 |
mta/mta-dotnet-external-provider-rhel8@sha256:1a126de51241bafba23c2dee0232af9012978e5c34a27f8b8e681c8f0e5e17a4 |
mta/mta-generic-external-provider-rhel9@sha256:28ab92f95860b7fefbe0c406959a8a6855b7b77f564a000f96c9e2468bfd59e8 |
mta/mta-java-external-provider-rhel9@sha256:b9436a56c8b53dc341d7d26c8e4ce186e790f9b930b790c186e3138761ef703b |
x86_64
mta/mta-analyzer-addon-rhel9@sha256:6666ce5a8071e6ab1d0cf95583e7ce0e68eecb54ce3fb4d388f2d6c7ceeadf99 |
mta/mta-cli-rhel9@sha256:dd977abeff6f92f42ecaa4dd1737e965e026e6abd9d1f5782f394bb39488bd42 |
mta/mta-discovery-addon-rhel9@sha256:a1f618ab6c0c568593db11afd163f79ba5995d39273ceb8d2e59858c278a1f46 |
mta/mta-dotnet-external-provider-rhel8@sha256:a96080e19ba0c20d401ff51ed40435b7077e53cd922c0da1b543b0deb05864da |
mta/mta-generic-external-provider-rhel9@sha256:febb010be2f8f3e44367d61d82bd2b338259741a28a75040ed2893959a3dfb9b |
mta/mta-hub-rhel9@sha256:2effd695aecda9c8460b144b709f0fe1ad6ed482e4e2097154dec0d1eb60dd06 |
mta/mta-java-external-provider-rhel9@sha256:bab911a353f0166c07ac8263f9ed9db65cf5676ebde6dc614211b959e89b2a23 |
mta/mta-operator-bundle@sha256:6aef520983fe01351886e108d32b998b20e74116fc0280c754a914bfad03d0bf |
mta/mta-rhel8-operator@sha256:718fa0fc81779b25d75d947ee55dd4f14b95ff2b8c20a73d397965a68e8fb6c4 |
mta/mta-ui-rhel9@sha256:fda035b08f3112fc0a9cd0f3790077034826b9f236b3b9adbbde708f0bf794ac |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.