Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:3316 - Security Advisory
Issued:
2024-05-23
Updated:
2024-05-23

RHSA-2024:3316 - Security Advisory

  • Overview
  • Updated Images

Synopsis

Important: Migration Toolkit for Applications security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Migration Toolkit for Applications 7.0.3 release

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

Description

Migration Toolkit for Applications 7.0.3 Images

Security Fix(es) from Bugzilla:

  • golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
  • webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)
  • axios: exposure of confidential data stored in cookies (CVE-2023-45857)
  • css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)
  • go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)
  • golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)
  • golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
  • css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)
  • follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)
  • golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
  • follow-redirects: Possible credential leak (CVE-2024-28849)

Solution

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Migration Toolkit for Applications 1 x86_64

Fixes

  • BZ - 2248979 - CVE-2023-45857 axios: exposure of confidential data stored in cookies
  • BZ - 2250364 - CVE-2023-26364 css-tools: Improper Input Validation causes Denial of Service via Regular Expression
  • BZ - 2252012 - CVE-2023-45286 go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2
  • BZ - 2253193 - CVE-2023-45287 golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
  • BZ - 2253330 - CVE-2023-39326 golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
  • BZ - 2254559 - CVE-2023-48631 css-tools: regular expression denial of service (ReDoS) when parsing CSS
  • BZ - 2256413 - CVE-2023-26159 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()
  • BZ - 2268046 - CVE-2024-24786 golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
  • BZ - 2268273 - CVE-2023-45288 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
  • BZ - 2269576 - CVE-2024-28849 follow-redirects: Possible credential leak
  • BZ - 2270863 - CVE-2024-29180 webpack-dev-middleware: lack of URL validation may lead to file leak
  • MTA-1578 - Admin drop-down can be enhanced
  • MTA-1959 - [Analysis issues] Unclear display for the 6th and higher incidents in a file
  • MTA-1961 - [Analysis issues] Issue details side drawer is not fully displayed by default
  • MTA-1970 - It is not clear that the Effort column in the "Affected applications page" is the total effort
  • MTA-1997 - [Controls][UI] Pages layout shifts in Controls tab
  • MTA-2003 - [Custom rules in analysis] Number of rules is 0 when manually uploading yaml file
  • MTA-2117 - Apps that inherit assessment occasionally don't get displayed on Reports tab
  • MTA-2186 - Tag filtering doesn't work if searching for empty tag type
  • MTA-2224 - [UI] Pagination leaves empty page when removing last element
  • MTA-2243 - [Analyzer] Affected file empty using JWS6 target
  • MTA-2287 - Tag sources should start with upper case letters
  • MTA-2308 - [Assessment] UI should show 'Unassessed' instead of 'Unknown' for unassessed applications
  • MTA-2314 - MTA CLI limitations with podman on windows
  • MTA-2341 - [Analyzer] Placeholder for`beans.xml` can be correctly interpolated.
  • MTA-2380 - Error message when editing an application tag
  • MTA-2400 - Selection of already selected tags should be disallowed for archetypes
  • MTA-2409 - With two required questionnaires app Assessment status should be 'In progress' after one questionnaire is taken
  • MTA-2410 - App Assesstment status should show 'In progress' when only one archetype has been assessed
  • MTA-2426 - [Jira instance] Unable to turn on "Enable insecure communication" switch
  • MTA-2427 - Failed to connect to Jira server using basic authentication: username & password
  • MTA-2451 - Application Inventory page doesn't get updated after application import
  • MTA-2452 - [Kantra CLI] Running test is successfull with many errors in the log
  • MTA-2495 - Repeated Assessment Override Notification Appears After Completion
  • MTA-2503 - Application assessment status doesn't get updated on its own after assessment is discarded
  • MTA-2505 - [Assessment] assessing an application and then disabling the questionnaire shows status 'In-Progress'
  • MTA-2512 - Retaking an assessment should retain the previous assessment data
  • MTA-2513 - [Analysis][DC] Analysis are failing on DC clusters with" Error: exit status 128 "
  • MTA-2518 - [CLI] Failing analysis on MAC
  • MTA-2550 - [Analysis] Some analyses fail with UNIQUE constraint failed error on Tags
  • MTA-2560 - [UI] Missing "Use multi select filter for application names" from All Issues Page
  • MTA-2563 - [Eclipse] [IDE] unable to run analysis on eclipse - mta 7.0.3
  • MTA-2616 - 'Retake' displayed instead of 'Take' after deleting Archetype assessment from Assessment Actions page
  • MTA-2652 - The Risk filter in the Reports Tab filters by value instead of by label when typing in it
  • MTA-2654 - [CLI] Some tests are failing with error about output.yaml
  • MTA-2661 - Binary analysis fails for a JAR file that has no external dependencies
  • MTA-2681 - Column name renamed "Tag category" to "Name" on Tags page
  • MTA-2781 - [Kantra CLI] Tool tried to pull image from a wrong place making analysis to fail

CVEs

  • CVE-2021-43618
  • CVE-2022-48554
  • CVE-2022-48624
  • CVE-2023-2975
  • CVE-2023-3446
  • CVE-2023-3817
  • CVE-2023-4408
  • CVE-2023-5678
  • CVE-2023-6129
  • CVE-2023-6237
  • CVE-2023-6240
  • CVE-2023-7008
  • CVE-2023-25193
  • CVE-2023-26159
  • CVE-2023-26364
  • CVE-2023-28322
  • CVE-2023-38469
  • CVE-2023-38470
  • CVE-2023-38471
  • CVE-2023-38472
  • CVE-2023-38473
  • CVE-2023-38546
  • CVE-2023-39326
  • CVE-2023-43785
  • CVE-2023-43786
  • CVE-2023-43787
  • CVE-2023-45286
  • CVE-2023-45287
  • CVE-2023-45288
  • CVE-2023-45289
  • CVE-2023-45290
  • CVE-2023-45857
  • CVE-2023-46218
  • CVE-2023-47038
  • CVE-2023-48631
  • CVE-2023-50387
  • CVE-2023-50868
  • CVE-2023-52425
  • CVE-2024-0727
  • CVE-2024-1394
  • CVE-2024-1488
  • CVE-2024-2961
  • CVE-2024-21011
  • CVE-2024-21012
  • CVE-2024-21068
  • CVE-2024-21094
  • CVE-2024-22365
  • CVE-2024-24783
  • CVE-2024-24784
  • CVE-2024-24785
  • CVE-2024-24786
  • CVE-2024-25062
  • CVE-2024-25742
  • CVE-2024-25743
  • CVE-2024-28834
  • CVE-2024-28835
  • CVE-2024-28849
  • CVE-2024-29180

References

  • https://access.redhat.com/security/updates/classification/#important

aarch64

mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc
mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99
mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092

x86_64

mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b
mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede
mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d
mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07
mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2
mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd
mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf
mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility