- Issued:
- 2025-04-15
- Updated:
- 2025-04-15
RHBA-2025:3882 - Bug Fix Advisory
Synopsis
Migration Toolkit for Applications bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
Migration Toolkit for Applications 7.2.2 release
Description
Migration Toolkit for Applications 7.2.2 Images
Affected Products
- Red Hat Migration Toolkit for Applications 1 x86_64
Fixes
- MTA-1825 - Redundant Warning on Reassessment of Applications with Inherited Assessments
- MTA-2984 - [Analysis] analyzing applications linked with private repository source control outputs different effort each time
- MTA-3366 - Custom rule for builtin provider does not match for a binary app in the hub (unlike CLI)
- MTA-3415 - Failed to get dependencies from pom.xml within war file
- MTA-3422 - [CLI] Unable to run analysis with a community provider
- MTA-3438 - [Analysis Wizard] Selected Go Set Targets page when returning back the page is just pre-selecting java targets
- MTA-4143 - containerless kantra - jdtls dirs are not cleaned up on Windows
- MTA-4629 - CLI doesn't allow custom targets
- MTA-4630 - Clicking enable on a questionnaire enables a different one
- MTA-4685 - The "Select All" selector doesn't work well in the Inventory view when filters are applied
- MTA-4697 - Two Issues have the same name and description but different rule IDs for tackle_testApp
- MTA-4772 - [CLI] No respective issues are triggered when custom rule was applied
- MTA-4782 - [CLI] HTML analysis report does not show help message in matching rule
- MTA-4811 - [Containerless CLI] [Linux] Report is missing issues comparing to container analysis when using maven settings file
- MTA-4816 - Serveral monitoring target down in console related to keycloak
- MTA-4868 - Errors reported in analyzer output (yaml) not propagated to the task.
- MTA-4886 - Following reducing bulk row selection to select none and select page, add "select all filtered"
- MTA-3845 - Migration issues are missing in MTA 7.1 compared to MTA 6
CVEs
- CVE-2023-52605
- CVE-2023-52922
- CVE-2024-8176
- CVE-2024-12087
- CVE-2024-12088
- CVE-2024-12747
- CVE-2024-43855
- CVE-2024-50264
- CVE-2024-50302
- CVE-2024-53113
- CVE-2024-53197
- CVE-2024-56171
- CVE-2024-57807
- CVE-2024-57979
- CVE-2025-1094
- CVE-2025-1244
- CVE-2025-21785
- CVE-2025-24070
- CVE-2025-24528
- CVE-2025-24928
- CVE-2025-27363
References
(none)
aarch64
| mta/mta-cli-rhel9@sha256:c5792c431dff6eb58438e2f53e2349ee329bebf0be818c8cdcbd2fffb7948f24 |
| mta/mta-dotnet-external-provider-rhel8@sha256:dec22b6216fb1d450d2ab367c4221b5083aa8649aeaa5a4dae9e2eb81bb5ad1d |
| mta/mta-generic-external-provider-rhel9@sha256:0146cf5e91d686b22533d5586f01c11514c086609d7f8db2823ca8379758dcf8 |
| mta/mta-java-external-provider-rhel9@sha256:d59fe722584d4de0b479e90684c59e1b11297100e7c4b5780d671a95577ec74d |
x86_64
| mta/mta-analyzer-addon-rhel9@sha256:b3254b6ff636288a8eac0ab70943822b0211a413958ff969a2b669885101382f |
| mta/mta-cli-rhel9@sha256:5cf3e6ff9ef33451e851c3a4aae6427df732bc99e652629575b48b39343c05bf |
| mta/mta-discovery-addon-rhel9@sha256:4aded8c994d56fb9213b0b5bc0873204a4188a99c790dd6529c3dd15497573a0 |
| mta/mta-dotnet-external-provider-rhel8@sha256:be9e9786041d115f7d84d64b074423d3b09fea7ee336b52143783e4ae937a48a |
| mta/mta-generic-external-provider-rhel9@sha256:e19a034d4b29af1d9713bf7d26f3b0033cebbb86aa3f9411bba0e9fc9cef1b51 |
| mta/mta-hub-rhel9@sha256:b94cca3fbeb3bdf48f83ec8721db1138285f091dc7224a3f297838cd408f9e74 |
| mta/mta-java-external-provider-rhel9@sha256:0fb416b3820dc46f9eeb189f126bb2eeefe78a61f4d7ba6c195d90ba272d28fa |
| mta/mta-operator-bundle@sha256:ca77947945fab4fff286af1d065aa9c5bc1221413dcb7fecdf7805070378d2fe |
| mta/mta-rhel8-operator@sha256:435da1ee6e8c8bc668f626a06a6abb2b4b174b4ed1f3b6cf7dbfc4156d9be142 |
| mta/mta-ui-rhel9@sha256:c3420ee57dda36aad6155c8439941a53988c6e1d6c73f54324e286c6dd9dc723 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.