- Issued:
- 2025-07-10
- Updated:
- 2025-07-10
RHBA-2025:10760 - Bug Fix Advisory
Synopsis
Migration Toolkit for Applications bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
Migration Toolkit for Applications 7.3.1 release
Description
Migration Toolkit for Applications 7.3.1 Images
Affected Products
- Red Hat Migration Toolkit for Applications 1 x86_64
Fixes
- MTA-4417 - OpenJDK21 Source + dependencies analysis on the Daytrader app produces a fluctuating effort count
- MTA-4885 - [UI] No custom rule issues are triggered
- MTA-4918 - [Analyzer] false positives on line 1 for Java rules
- MTA-4972 - Name of ruleset is wrong
- MTA-5049 - Rules not being triggered in pomless application
- MTA-5068 - [CLI] Analysis of non-java application tries to run in containerless mode
- MTA-5070 - [UI] Source+dependency analysis on python and nodejs providers is not supported
- MTA-5089 - [CLI] list-languages doesn't work for binary apps
- MTA-5092 - [Asset generation] Incorrect error message when --chart-dir is not set for generate command
- MTA-5173 - Custom rules are ignored on Gradle apps
- MTA-5181 - Page reload is required sometimes to see effort count after analysis
- MTA-5293 - [CLI] Revert messages being displayed at issue level in static reports
- MTA-5369 - "unable to ask for Konveyor rule entry" errors during analysis on MTA deployment with low resources
- MTA-5385 - Configuring a ssh connection to a git repository fails
- MTA-5386 - Conditional check for Tackle fails when authentication is required
- MTA-5398 - Dependency resolution takes a long time for multi-module apps when dependency resolution fails
- MTA-5399 - Cannot skip dependency analysis in the CLI
- MTA-5426 - Resources and limits not present on all pods
- MTA-5427 - Windows containerless kitchensink.war analysis is missing violation
- MTA-5629 - Source repository field is not accepting the URL
CVEs
- CVE-2022-3424
- CVE-2023-52933
- CVE-2024-12718
- CVE-2024-53920
- CVE-2025-3576
- CVE-2025-4138
- CVE-2025-4330
- CVE-2025-4435
- CVE-2025-4517
- CVE-2025-4802
- CVE-2025-5702
- CVE-2025-6020
- CVE-2025-21756
- CVE-2025-21764
- CVE-2025-21883
- CVE-2025-21919
- CVE-2025-21920
- CVE-2025-21926
- CVE-2025-21961
- CVE-2025-21963
- CVE-2025-21964
- CVE-2025-21966
- CVE-2025-21969
- CVE-2025-21979
- CVE-2025-21997
- CVE-2025-21999
- CVE-2025-22055
- CVE-2025-22104
- CVE-2025-22126
- CVE-2025-22871
- CVE-2025-23150
- CVE-2025-25724
- CVE-2025-30399
- CVE-2025-37738
- CVE-2025-37749
- CVE-2025-37750
- CVE-2025-37785
- CVE-2025-37943
References
(none)
aarch64
| mta/mta-cli-rhel9@sha256:69472d2e37093bda277a9593437a42e6692ec02f2503009f05b3702d4f610302 |
| mta/mta-dotnet-external-provider-rhel9@sha256:9e833a26a1611f6a10237a43daab14e45b3a5fa1162be94b485fa20ea7248bfa |
| mta/mta-generic-external-provider-rhel9@sha256:7e8dbf6699c1537e58f79672786b3e7aaa6bc74f4fd4298e7bdc7f5ec676f521 |
| mta/mta-java-external-provider-rhel9@sha256:ff5a671e328cb1a92a106b71c6a8bac8c5523b8eaf2f99cc59aa2f41d60e6f50 |
x86_64
| mta/mta-analyzer-addon-rhel9@sha256:2251815155af2ee6cf324224561d839631a11d9df0f1f95f5accb31007387300 |
| mta/mta-cli-rhel9@sha256:6c54904b01d6b0a55e6c18e814d226ce67c6b774e04c2a133ad04ba498ce30f6 |
| mta/mta-discovery-addon-rhel9@sha256:59adc6cd21aa2c6f9ae7e804456ab62ca529e4c7d60e81deadc109ef8521c19b |
| mta/mta-dotnet-external-provider-rhel9@sha256:4bc47c2aa5b7b6bfd4ff921673bb4cc389d306231636765a0a1c424f62645592 |
| mta/mta-generic-external-provider-rhel9@sha256:95135d3b586c394a64ae6c88c99346f926b4fcf750e296a38a3a5b4d989e24b9 |
| mta/mta-hub-rhel9@sha256:8d755e004017325f8d7c4284a24ec965dcbc05a399ea4b526b05216b7e832607 |
| mta/mta-java-external-provider-rhel9@sha256:d158d02be3e103da5e542447efa68bb853ccf1205b5d899cedac49ba3aced395 |
| mta/mta-operator-bundle@sha256:ac10a164d0fe30915568ccc293b5a97a37befa4373c9bd947e3af972d37debc1 |
| mta/mta-rhel9-operator@sha256:584cb3890b1ac911293abcad056bf88d27c8ae7666c2c0a6f706b88ca0204f6e |
| mta/mta-ui-rhel9@sha256:9c86f5dce9ebc2c4444462d36507140a81284f0eca56d8c601ef593fa98dbeae |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.