- Issued:
- 2025-09-30
- Updated:
- 2025-09-30
RHBA-2025:17013 - Bug Fix Advisory
Synopsis
Migration Toolkit for Applications bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
Migration Toolkit for Applications 8.0.0 release
Description
Migration Toolkit for Applications 8.0.0 Images
Affected Products
- Red Hat Migration Toolkit for Applications 1 x86_64
Fixes
- MTA-3780 - Analysis on Gradle application is not raising issues on dependencies
- MTA-3821 - [CLI] Unable to init the Python providers
- MTA-4033 - [CLI] [Gradle] Containerless analysis does not detect dependencies in Gradle projects
- MTA-4598 - Daytrader app analysis doesn't show dependencies due to outdated maven version
- MTA-4749 - MTA UI breaks when bad indentation of custom rule file is uploaded
- MTA-4908 - Maven outage-unable to find the decompressed sources for the dependency
- MTA-4960 - [CLI] Report of Gradle analysis doesn't contain any issue or dependencies
- MTA-5148 - [CLI] "error getting target subdir" message when running containerless binary java analysis
- MTA-5621 - Camel rule java-generic-information-00002 has false positives
- MTA-5630 - [Analysis] Zero effort points
- MTA-5739 - [Task manager] Sorting/Filtering by "Kind" breaks the Task Manager page
- MTA-5750 - False positives for annotation rule springboot-jmx-to-quarkus-00001 for bookServer
- MTA-5753 - [Task manager] The username is not displayed in the "Created by" column for the analyzer task
- MTA-5754 - [CLI] Analysis command fails to run in local mode
- MTA-5755 - [CLI] Analysis command fails to run in container mode
- MTA-5786 - Analysis fails with custom rules fetched from a repository
- MTA-5877 - CLI is totally broken and analysis always fails
- MTA-5878 - Analyzer fails to select addon causing analysis and discovery to fail
- MTA-5883 - Unknown assessment risk type for assessed applications
- MTA-5899 - Add link for Insights on application drawer page
- MTA-5938 - Using 2 sets of credentials for application and custom rules breaks custom rules cloning
- MTA-5939 - Messages in downloaded static report are not always displayed
- MTA-5946 - Analysis on OpenMRS app fails
- MTA-5977 - IngressWithoutClassName Alert caused by MTA when using rhbk
- MTA-6002 - [CLI][Assets Generation] healthCheck and readinessCheck contain wrong fields
- MTA-6003 - [Applications] The Source platform section in the create new application wizard is expanded by default
- MTA-6004 - [UI] Top kebab menu in application inventory is incorrectly available for migrator users
- MTA-6005 - [Source platform] CF item in the Type select list is displayed as cloudfoundry
- MTA-6008 - Unable to run tests locally from fresh kantra distribution
- MTA-6011 - Git PAT with `\` fails to clone git repositories
- MTA-6023 - [Source platform] Missing tooltip to clarify the expected CF URL
- MTA-6024 - [Source platform] Redundant "Save" button in the "Discover Applications" wizard
- MTA-6025 - [Source platform] The downloaded schema file is named with a duplicated .json extension
- MTA-6027 - PCF Generator should come seeded at installation
- MTA-6030 - [CLI][Assets Generation] Single-process applications with configuration at top level are not being processed correctly
- MTA-6037 - [Platform awareness] Remove redundant 'Back' button on 'Retrieve configurations' wizard
- MTA-6045 - Analysis performance is significantly degraded in a disconnected environment or if maven central is not available and maven search is not disabled
- MTA-6046 - tech-discovery task is displayed as analyzer
- MTA-6049 - PCF discovery fails if an application has tasks associated with it
- MTA-6100 - Cannot update an application when source platform is set
- MTA-6103 - [Asset generation] asset-generation task fails with '401(Unauthorized)' error
- MTA-6109 - [CLI][Assets Generation] The --set flag doesn't work as expected when changing values in a dictionary
- MTA-6116 - [Assets generation] Failed to "oc apply" generated asset templates
- MTA-6118 - Filtering Source Platforms by Type = Cloud Foundry is broken
- MTA-6138 - Pod stuck in CrashLoopBackOff status after nginx deployment on OCP
- MTA-2261 - Entity kebab dropdowns should look the same across the UI
- MTA-2783 - MTA UI - Importing duplicate questionnaire shows wrong notification
- MTA-4025 - [Ruleset] javaee-to-jakarta-namespaces-00033 false positive case
- MTA-4824 - Missing Issues for example-1-app
- MTA-5234 - tech-discovery for nodejs app selects the java extension.
- MTA-5631 - Assessments are not marked as complete
- MTA-5634 - Rule local-storage-00001 File system - Java IO is reporting false positives
- MTA-5793 - Asset Generation CLI - Generate must handle default values
- MTA-5884 - Newly created Tag does not appear immediately on the UI
- MTA-5898 - Analysis fails for tackletestapp with 409(Conflict) body: {"error":"UNIQUE constraint failed:}'
- MTA-5903 - Capitalize text on insight drawer page
- MTA-5927 - Update openapi spec file
- MTA-5979 - Dependency custom rule is not triggered if credencial is not attached
- MTA-5981 - UI breaks connection when sorting dependencies by labels
- MTA-6106 - Bulk analysis task canceled.
- MTA-6121 - Platform discovery should support form-based input
- MTA-6122 - Remove "asset repository" type credentials
- MTA-6124 - Missing tooltip text on 'Create new platform' wizard
- MTA-6099 - Applications are always showing "High" risk no matter how you assess .
- MTA-6117 - Generate assets / Retrieve configuration is not existent if asset repo/platform details are missing
- MTA-6135 - Asset generation fails with the 'generator kind not supported'? error .
- MTA-6163 - Analysis fails when custom rules from a repository are attached as a target card
- MTA-6172 - Analysis with dependencies shows "Completed with errors"
- MTA-6173 - Tech discovery task is failing for all applications
- MTA-6192 - Editing of application with credentials associated fails with 409 error
CVEs
- CVE-2023-49083
- CVE-2024-28956
- CVE-2025-5914
- CVE-2025-6020
- CVE-2025-6395
- CVE-2025-8194
- CVE-2025-8941
- CVE-2025-9566
- CVE-2025-21867
- CVE-2025-22058
- CVE-2025-22097
- CVE-2025-32988
- CVE-2025-32989
- CVE-2025-32990
- CVE-2025-37803
- CVE-2025-37823
- CVE-2025-37914
- CVE-2025-38084
- CVE-2025-38085
- CVE-2025-38124
- CVE-2025-38159
- CVE-2025-38200
- CVE-2025-38211
- CVE-2025-38250
- CVE-2025-38332
- CVE-2025-38350
- CVE-2025-38352
- CVE-2025-38380
- CVE-2025-38392
- CVE-2025-38417
- CVE-2025-38449
- CVE-2025-38461
- CVE-2025-38464
- CVE-2025-38471
- CVE-2025-38500
- CVE-2025-38550
- CVE-2025-38684
- CVE-2025-39825
- CVE-2025-58060
- CVE-2025-58364
References
(none)
aarch64
| mta/mta-cli-rhel9@sha256:d87d1b55f511739213159b6808d03f6c6a4dfea7048fe03c69b22df8eab27525 |
| mta/mta-dotnet-external-provider-rhel9@sha256:1e2f773a02adaba38440451da5a03a2358583555465eebeae379d00ad4d717ef |
| mta/mta-generic-external-provider-rhel9@sha256:18856b2e3bfcae1d47c08e2c2b29d70a9c68c8b63a97f9570ed34f4a577c3365 |
| mta/mta-java-external-provider-rhel9@sha256:7dd18ac6cf905c4842e3db0460402d7c9dcd9a63aca24fd5bf5f220a53574fc1 |
x86_64
| mta/mta-analyzer-addon-rhel9@sha256:5c315a2dbfc43fbc2fc000e4e72ca13c811f9264f6fe95607357da5824685cbb |
| mta/mta-cli-rhel9@sha256:52ba5602bf5889cc7a53c5dd47e5d0386f258a6250601dcf5ac349a16de1eb51 |
| mta/mta-discovery-addon-rhel9@sha256:18b46b0c52b2ac495001cb5766c2fa28f118b39707fafc969292ae13af18a66d |
| mta/mta-dotnet-external-provider-rhel9@sha256:eabc52d4d800e84ab963d6497fbb1d1d8fe45f21aff16f3b933424c6df5e946e |
| mta/mta-generic-external-provider-rhel9@sha256:5f7ac23a32c4432ece5f3d604db36e89f30b3e5e02762a56d4068a7b81052d76 |
| mta/mta-hub-rhel9@sha256:46d95aa685782f4b704507b90a19a773215ba8249b51287c37b9e75283fbbc20 |
| mta/mta-java-external-provider-rhel9@sha256:e94687e5642f4938964566cd99c521ff334acb75bfa399c4e00a8cba1a968e3d |
| mta/mta-operator-bundle@sha256:0ec977b0c9c26551db110dcf2d5069647b1a5495f869ff48a0319cb496b84cdc |
| mta/mta-platform-addon-rhel9@sha256:16174d2f3da7b2009eac1da88aba3a95f2985228f96dd03fd29839edae187ecc |
| mta/mta-rhel9-operator@sha256:3068e6741290936c41003574b9e4f89b14d352527c336c04c958f25313c19971 |
| mta/mta-solution-server-rhel9@sha256:95e31bc03719828ce636597d25558e5c89507105957dd1d5e3ab71459877f325 |
| mta/mta-ui-rhel9@sha256:8ab012ebbf6fad3b7a9ec582d70e4a4f5759235c9329f172046a4409b4982774 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.