Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0529 - Security Advisory
Issued:
2012-04-30
Updated:
2012-04-30

RHSA-2012:0529 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated Messaging packages that resolve one security issue, fix multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2.1 for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.

MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.

It was found that Qpid accepted any password or SASL mechanism, provided
the remote user knew a valid cluster username. This could give a remote
attacker unauthorized access to the cluster, exposing cluster messages and
internal Qpid/MRG configurations. (CVE-2011-3620)

Note: If you are using an ACL, the cluster-username must be allowed to
publish to the qpid.cluster-credentials exchange. For example, if your
cluster-username is "foo", in your ACL file:

acl allow foo@QPID publish exchange name=qpid.cluster-credentials

The CVE-2011-3620 fix changes the cluster initialization protocol. As such,
the cluster with all new version brokers must be restarted for the changes
to take effect. Refer below for details.

These updated packages provide numerous enhancements and bug fixes for the
Messaging component of MRG. Space precludes documenting all of these
changes in this advisory. Documentation for these changes will be available
shortly in the Technical Notes document linked to in the References
section.

All users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are
advised to upgrade to these updated packages, which resolve the issues and
add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.
After installing the updated packages, stop the cluster by either running
"service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one
of the cluster nodes. Once stopped, restart the cluster with
"service qpidd start" on all nodes for the update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise MRG Messaging 2 for RHEL 5 x86_64
  • Red Hat Enterprise MRG Messaging 2 for RHEL 5 i386
  • MRG Grid 2 for RHEL 5 x86_64
  • MRG Grid 2 for RHEL 5 i386
  • MRG Grid from RHUI 2 for RHEL 5 x86_64

Fixes

  • BZ - 650969 - [RFE] qpid-winsdk should support Microsoft Visual Studio 2010
  • BZ - 674379 - [RFE] IPv6 support for qpid C++ messaging
  • BZ - 691654 - qpidd broker triggers SELinux AVCs avc: denied { search } for pid=27642 comm="qpidd" name="/" dev=sysfs ino=1 scontext=unconfined_u:system_r:qpidd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir
  • BZ - 700632 - qpid-java-common rpm erroneously includes qpid-ra-0.10.jar
  • BZ - 704596 - The toString() representation of the JMSDestination of a received message is different from the toString() representation on the sender side.
  • BZ - 705418 - Ability to acknowledge all messages up to and including a given message for a Session
  • BZ - 726102 - cpp client parsing error when dealing with empty strings
  • BZ - 727182 - Support DTX transactions in a cluster.
  • BZ - 730981 - Unable to create binding while sending messages on default exchange using addressing
  • BZ - 731368 - Only one message is consumed using c++ drain by default
  • BZ - 733241 - 'qpid-config queues <queue_name>' should return proper error code
  • BZ - 733383 - Single message can be delivered to multiple client
  • BZ - 734729 - qpidd broker crash during shutdown
  • BZ - 735208 - management of store/journal no longer available
  • BZ - 747078 - CVE-2011-3620 qpid-cpp: cluster authentication ignores cluster-* settings
  • BZ - 751845 - Allow SSL and non-SSL connections on the same port
  • BZ - 760112 - Journal management stats not available for recovered queues
  • BZ - 760636 - Message Group query method should include message timestamp if present.
  • BZ - 761186 - Java client mishandles tcp_nodelay when specified as part of the broker URL

CVEs

  • CVE-2011-3620

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0529
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise MRG Messaging 2 for RHEL 5

SRPM
python-qpid-0.14-6.el5.src.rpm SHA-256: fa80c1495db7610e20c7193dcf097028db45ff1468b95703979f9cdfd4a7687a
qpid-cpp-mrg-0.14-14.el5.src.rpm SHA-256: 104c1af7ffbb8269a7101eb8c58c26f64f1f10272080a383fb241771f5e4173f
qpid-java-0.14-3.el5.src.rpm SHA-256: f9726dfd806e5b404f91a2d6fa0a0f0fcabc0ba1f1802e94841755def071819d
qpid-jca-0.14-9.el5.src.rpm SHA-256: 87d4c698ef2d5f235fb678862506c111b0708ccb374af97ce498ffe8ae49ec36
qpid-qmf-0.14-9.el5.src.rpm SHA-256: 868f365a10ffc372139493f56602c7a2ce8f4550ea6503f7cb5789aaa4303b52
qpid-tests-0.14-1.el5.src.rpm SHA-256: a681694ba90a830d1394d10903e0cedcf37444baf1a335f3afe1766bba1ee769
qpid-tools-0.14-2.el5.src.rpm SHA-256: 4166ef0f9424e1b7eb0478b5d38c3139ccbc7a58221eab12f9cd69941646a64f
sesame-1.0-3.el5.src.rpm SHA-256: 25075e6007a716eb5ae7c83989cbe11220b5dd47c7d2c468b2e155184bd3ac92
x86_64
python-qpid-0.14-6.el5.noarch.rpm SHA-256: d9ba25f7aa102b88b8ffd14d626bfda7392ae006e409636036af050b61ee041a
python-qpid-qmf-0.14-9.el5.x86_64.rpm SHA-256: 018ce437808010be2d82cf96cde9d5752c1d0e230c699813e43c459d3f1e5f37
qpid-cpp-client-0.14-14.el5.x86_64.rpm SHA-256: 78e99e64be1ffc272115ccd264dd28cfa63b2c3c598b9683fdbcbd08572b5680
qpid-cpp-client-devel-0.14-14.el5.x86_64.rpm SHA-256: 7b2291bd54240ab7ab0ef1cb4e3a39e9fd34514c575f7b15e12bf45fe0cc918a
qpid-cpp-client-devel-docs-0.14-14.el5.x86_64.rpm SHA-256: 26d57a6ad41c8291e4bff28005698bbf75e2e7032612ecffbbeef49f23e2b8cd
qpid-cpp-client-rdma-0.14-14.el5.x86_64.rpm SHA-256: 253e7c8c7cddf7a16cfd5888dbb70d968e7fd53fceb0021274a59e13992977f6
qpid-cpp-client-ssl-0.14-14.el5.x86_64.rpm SHA-256: 034cc8f372c930df8d7258b80b219f7f4373347ba4ef37925b081bd1cac24c11
qpid-cpp-server-0.14-14.el5.x86_64.rpm SHA-256: 6334a4398dbc5bd89d0dfb25454bf84a8f4c21d56d8a58710b36dc050abec6ae
qpid-cpp-server-cluster-0.14-14.el5.x86_64.rpm SHA-256: e485115832e26036f1699602d7483eb14d42cac284c45b50f5cb59c773dbaee6
qpid-cpp-server-devel-0.14-14.el5.x86_64.rpm SHA-256: 5e3240e0b2a438b7c7fd4c6fec09f03f93472b515da9bf2aed8cb12e8fba1ddf
qpid-cpp-server-rdma-0.14-14.el5.x86_64.rpm SHA-256: e1ac499f36ead30ea0afd2e41d9f01468bf4b18ff75e0b918ee7dc80579966cd
qpid-cpp-server-ssl-0.14-14.el5.x86_64.rpm SHA-256: f26eb85b2b13d8bdbafb944cdfebb7df565649a8598d2b31b25572473aa50e56
qpid-cpp-server-store-0.14-14.el5.x86_64.rpm SHA-256: 6d30e52cf6447a3f8546ab6768f27217edf441663f54d89156492fccd69bcc07
qpid-cpp-server-xml-0.14-14.el5.x86_64.rpm SHA-256: bbc0d910c438c9f4156f9f7f6982347f542c4966642f39383ca6c69c0e535152
qpid-java-client-0.14-3.el5.noarch.rpm SHA-256: 8e2e45d5fae6d1fa03983c832738d0027fd4dd624cbfe74c278bdef5ea0c3264
qpid-java-common-0.14-3.el5.noarch.rpm SHA-256: 81dc4367c3d925c61a9c6862dcd065049a6ac10c5789e145dd621b5d6c0e82f1
qpid-java-example-0.14-3.el5.noarch.rpm SHA-256: 92c721cc385aa0f7fcd138142ce517a8c8564a85441202f70a18e526a3ee6053
qpid-jca-0.14-9.el5.noarch.rpm SHA-256: 59d598296edf143167628709bd7afcf0574e5cf65c232cc105ce6cd0a281e8f4
qpid-jca-xarecovery-0.14-9.el5.noarch.rpm SHA-256: 6e30a04087eca8ff2e8b7708b5cfd09889aa74105b8e0abfc12cb0c961080bed
qpid-qmf-0.14-9.el5.x86_64.rpm SHA-256: ff355873dca41f1de6b6e27ef82c91cea03754a6ca77832f345fa6d9c2a8dd0e
qpid-qmf-devel-0.14-9.el5.x86_64.rpm SHA-256: dc99d24313a148a8ced5881cc783b5c31d9ea5baee04056a69b9753650d58df6
qpid-tests-0.14-1.el5.noarch.rpm SHA-256: 57574ee7c68a70f4c71da8274c9a60f8ef43e6038ebf252a2a9102eabfdf372e
qpid-tools-0.14-2.el5.noarch.rpm SHA-256: 38840712058b29f30a15f3536bb2af98277135be4a7990cd6209d14019a1db77
ruby-qpid-qmf-0.14-9.el5.x86_64.rpm SHA-256: b4244752af7638383a54806b9169227480dc71643c69dc20188c6aff03a2ceb7
sesame-1.0-3.el5.x86_64.rpm SHA-256: 45035c130c8a17be8ed8dc04e2a5001fb222a8a4c472e7842abbd291144b69ad
i386
python-qpid-0.14-6.el5.noarch.rpm SHA-256: d9ba25f7aa102b88b8ffd14d626bfda7392ae006e409636036af050b61ee041a
python-qpid-qmf-0.14-9.el5.i386.rpm SHA-256: bced3922acaacf82d278ab1a94a7cdfe0ff7dd5fe3a81ac7f415dbcd51f7b31f
qpid-cpp-client-0.14-14.el5.i386.rpm SHA-256: 277b07e219a4974ffe9d4f290956916ce0c265ab12b08e7a1f73c09a95bfbe1d
qpid-cpp-client-devel-0.14-14.el5.i386.rpm SHA-256: 35452c1adccef24deb70c00ef4827c2b145725a968d9f2c971b12ff4ea359ea0
qpid-cpp-client-devel-docs-0.14-14.el5.i386.rpm SHA-256: b99b99ce7c944317fecb715908803ebf270df3ce404e6225466101308ef5c384
qpid-cpp-client-rdma-0.14-14.el5.i386.rpm SHA-256: 26b1871c59735250cd1da28511ab4bc03a78a23b5c70be454902525175302125
qpid-cpp-client-ssl-0.14-14.el5.i386.rpm SHA-256: b81e923a2794602cec0f618e136acb5beaae0d594eae241efa4eba6fe6c59e07
qpid-cpp-server-0.14-14.el5.i386.rpm SHA-256: 8b9ce950f2acdfc252f02a07d39d0a169ab12707da516c0d4ad4a096d2fec9e7
qpid-cpp-server-cluster-0.14-14.el5.i386.rpm SHA-256: 3cab17ec877afba8dba8a38ec914ba301c5dffd966976764cba4c26ce7b90cf4
qpid-cpp-server-devel-0.14-14.el5.i386.rpm SHA-256: bcf6082d26625e74e977e37de3bf5b61e109ee91a15e2035439331d4c559c02e
qpid-cpp-server-rdma-0.14-14.el5.i386.rpm SHA-256: bf283ea4f0d866c6b04a9f79dc43e921eed54f114c74e02db59056099d10642e
qpid-cpp-server-ssl-0.14-14.el5.i386.rpm SHA-256: 49458c9303e55f15c57b33380a6245a1fb063613a8212d0803bfae53e77c2f98
qpid-cpp-server-store-0.14-14.el5.i386.rpm SHA-256: 2e31b2249eeb0153fff020106c7dc798e748658a601b13883600e16ea4d77ad9
qpid-cpp-server-xml-0.14-14.el5.i386.rpm SHA-256: c013f0d2279b50437b15ce383867c01882f780bf344bc8de765fc73d12980ea4
qpid-java-client-0.14-3.el5.noarch.rpm SHA-256: 8e2e45d5fae6d1fa03983c832738d0027fd4dd624cbfe74c278bdef5ea0c3264
qpid-java-common-0.14-3.el5.noarch.rpm SHA-256: 81dc4367c3d925c61a9c6862dcd065049a6ac10c5789e145dd621b5d6c0e82f1
qpid-java-example-0.14-3.el5.noarch.rpm SHA-256: 92c721cc385aa0f7fcd138142ce517a8c8564a85441202f70a18e526a3ee6053
qpid-jca-0.14-9.el5.noarch.rpm SHA-256: 59d598296edf143167628709bd7afcf0574e5cf65c232cc105ce6cd0a281e8f4
qpid-jca-xarecovery-0.14-9.el5.noarch.rpm SHA-256: 6e30a04087eca8ff2e8b7708b5cfd09889aa74105b8e0abfc12cb0c961080bed
qpid-qmf-0.14-9.el5.i386.rpm SHA-256: e489ffe8ec523bb97bbf39025b4771ed4a89ecdc057c3cadba4e79e08b61b40f
qpid-qmf-devel-0.14-9.el5.i386.rpm SHA-256: 6d87f2397d8c4adea7c79fe31a9569e2f560e5dd3ca0c9fed18c6abeec08597c
qpid-tests-0.14-1.el5.noarch.rpm SHA-256: 57574ee7c68a70f4c71da8274c9a60f8ef43e6038ebf252a2a9102eabfdf372e
qpid-tools-0.14-2.el5.noarch.rpm SHA-256: 38840712058b29f30a15f3536bb2af98277135be4a7990cd6209d14019a1db77
ruby-qpid-qmf-0.14-9.el5.i386.rpm SHA-256: cba40c18112271e44694a18d10abb12c85e0d28f0b8da0cf4f5f5b3150141c86
sesame-1.0-3.el5.i386.rpm SHA-256: 716814f84bfa357072b8c8e4069498b066d7d33cb4a1cbb6ca15b3a7e7883bf8

MRG Grid 2 for RHEL 5

SRPM
condor-7.6.5-0.14.el5.src.rpm SHA-256: e09fe76eb25c18dc21af0a289e84ece94a89914474b7c500234c31c03b20411e
sesame-1.0-3.el5.src.rpm SHA-256: 25075e6007a716eb5ae7c83989cbe11220b5dd47c7d2c468b2e155184bd3ac92
x86_64
condor-7.6.5-0.14.el5.x86_64.rpm SHA-256: c0e5896454ec8d30633143de1a8dab50a1c42d9e10ae9df96272ed4e050645c7
condor-aviary-7.6.5-0.14.el5.x86_64.rpm SHA-256: 7d710d079e9c07b5c3f35932ac9002ed6596771d0235d928428714836e1bbe21
condor-classads-7.6.5-0.14.el5.x86_64.rpm SHA-256: 1180896417535df12632921144557f5ad881f6a5e5e2b9a43bc37746260efe19
condor-kbdd-7.6.5-0.14.el5.x86_64.rpm SHA-256: 63e400bafece1165fca6c9b37641c97433df4bc149945b21e1042a783db54430
condor-qmf-7.6.5-0.14.el5.x86_64.rpm SHA-256: c69e2b7982b9ad8d0c234c01ca8b7285035e4ad63a6541203a238b63474482c5
condor-vm-gahp-7.6.5-0.14.el5.x86_64.rpm SHA-256: 3b2658e001a5cc4bb5dd92341c52ed848e9a62bd2515a1ca31d36d92ee1b83f8
sesame-1.0-3.el5.x86_64.rpm SHA-256: 45035c130c8a17be8ed8dc04e2a5001fb222a8a4c472e7842abbd291144b69ad
i386
condor-7.6.5-0.14.el5.i386.rpm SHA-256: 6f8826f10d8ac2244a95b2d5955c5dc40b38b6048fc79622c4a3a8aea6162465
condor-aviary-7.6.5-0.14.el5.i386.rpm SHA-256: 662b43ff9f45ef4c6cd16240857814b6166d8444c3c80af2cda0519746e3fa86
condor-classads-7.6.5-0.14.el5.i386.rpm SHA-256: 461ff31b91cc80d297cf8d3c25644286f3a54eaac065af2fe22028400b8c256b
condor-kbdd-7.6.5-0.14.el5.i386.rpm SHA-256: 6233f6982686903f59e56f8ec6afee3fa662c1193aad6e99db55400701076d2a
condor-qmf-7.6.5-0.14.el5.i386.rpm SHA-256: 1534a577cf06d1d3710abbcac751ded568cc0b4758c07f9d236108130e01713b
condor-vm-gahp-7.6.5-0.14.el5.i386.rpm SHA-256: 218457242211f1c2cb645797d26d2f026c58ea03f5fc3373bdcd33b6cfdf048e
sesame-1.0-3.el5.i386.rpm SHA-256: 716814f84bfa357072b8c8e4069498b066d7d33cb4a1cbb6ca15b3a7e7883bf8

MRG Grid from RHUI 2 for RHEL 5

SRPM
x86_64

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility