Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:1279 - Security Advisory
Issued:
2012-09-19
Updated:
2012-09-19

RHSA-2012:1279 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat Enterprise MRG Messaging 2.2 update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated Messaging component packages that fix one security issue, multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2.2 for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.

MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.

It was discovered that the Apache Qpid daemon (qpidd) did not require
authentication for "catch-up" shadow connections created when a new broker
joins a cluster. A malicious client could use this flaw to bypass client
authentication. (CVE-2012-3467)

This update also fixes multiple bugs and adds enhancements. Documentation
for these changes will be available shortly from the Technical Notes
document linked to in the References section.

All users of the Messaging capabilities of Red Hat Enterprise MRG 2.2 are
advised to upgrade to these updated packages, which resolve the issues and
add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.
After installing the updated packages, stop the cluster by either running
"service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one
of the cluster nodes. Once stopped, restart the cluster with "service qpidd
start" on all nodes for the update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • MRG Realtime 2 x86_64
  • Red Hat Enterprise MRG Messaging 2 for RHEL 6 x86_64
  • Red Hat Enterprise MRG Messaging 2 for RHEL 6 i386
  • MRG Grid 2 for RHEL 6 x86_64
  • MRG Grid 2 for RHEL 6 i386
  • MRG Grid Execute 2 x86_64
  • MRG Grid Execute 2 i386
  • MRG Grid from RHUI 2 for RHEL 6 x86_64
  • MRG Management 2 x86_64
  • MRG Management 2 i386

Fixes

  • BZ - 836276 - CVE-2012-3467 qpid-cpp-server-cluster: unauthorized broker access caused by the use of NullAuthenticator catch-up shadow connections

CVEs

  • CVE-2012-3467

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/sec-Red_Hat_Enterprise_Linux_6.html#RHSA-2012-1279
Note: More recent versions of these packages may be available. Click a package name for more details.

MRG Realtime 2

SRPM
mrg-release-2.2.0-1.el6.src.rpm SHA-256: 200a886631724612a4cfd8eeb3d69f0908a08132b1bd759b784d5b4531e5fc73
x86_64
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663

Red Hat Enterprise MRG Messaging 2 for RHEL 6

SRPM
mrg-release-2.2.0-1.el6.src.rpm SHA-256: 200a886631724612a4cfd8eeb3d69f0908a08132b1bd759b784d5b4531e5fc73
qpid-cpp-0.14-22.el6_3.src.rpm SHA-256: 5f6d259c74f6804210e6f843d10a5eb220692de250df59f1f94c2edb9e962d11
qpid-java-0.18-2.el6.src.rpm SHA-256: c0e654286578249c66cf0bd7889739c7dcc02fa3bc5d0cdbcc5c1139effba7ce
qpid-jca-0.18-2.el6.src.rpm SHA-256: 11b1e47460c1901239d9f759a69c6742f486dca7438e1f9da7180b8673841e65
qpid-qmf-0.14-14.el6_3.src.rpm SHA-256: 2f3652ce7606afa851af60e167e90b6d6bf1d993f018997ce615eed8108a28e2
xerces-c-3.0.1-20.el6.src.rpm SHA-256: 41e575832f2aff24415a157704257600f4cb9a178f57813a699631698f481e4a
xqilla-2.2.3-8.el6.src.rpm SHA-256: 358a59b6a03580a9ca77e5e470a2ad52d71295661f12c3a3944626bd86393591
x86_64
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663
qpid-cpp-client-devel-0.14-22.el6_3.x86_64.rpm SHA-256: 0304823dda98a3e49abf70d991d75053cea96770493bc184baf894aedf019dfc
qpid-cpp-client-devel-docs-0.14-22.el6_3.noarch.rpm SHA-256: f86e1131a9ec2f96d24c812c6659dce4665eccd2d18bc83ca10ff40582d1ac16
qpid-cpp-client-rdma-0.14-22.el6_3.x86_64.rpm SHA-256: e9b268d7dc934421af2986e6963475c1bcad683f6352388a018e91a77404e96e
qpid-cpp-debuginfo-0.14-22.el6_3.x86_64.rpm SHA-256: dd1e95481d6c7357c574806b63589815f14c3eef70d5319d58a2c2418b157c56
qpid-cpp-server-cluster-0.14-22.el6_3.x86_64.rpm SHA-256: 12904fa2fa3ee9037c5a10e2ec604da8c1c9f012e05ada65d68527f6e6d7b066
qpid-cpp-server-devel-0.14-22.el6_3.x86_64.rpm SHA-256: 83aa70d7db4541a4640687b37503e33f40709d3ae3fddad9e0176ffaed8fbc4e
qpid-cpp-server-rdma-0.14-22.el6_3.x86_64.rpm SHA-256: 638d246c4bdce4dac870a5812ff3ecaff5c110d4fe2ef768d69536bcf9959e33
qpid-cpp-server-store-0.14-22.el6_3.x86_64.rpm SHA-256: 2f90f2804c4efb67ab667c64a52967c5a1f3975a222752829610ba5ffa712aec
qpid-cpp-server-xml-0.14-22.el6_3.x86_64.rpm SHA-256: 1249069271dd61b434b4cbd4212c2d7e3b144361994f0b4a469e1be295e8da31
qpid-java-client-0.18-2.el6.noarch.rpm SHA-256: a75cd1690741780d05bdacb67284eeb3e9ab839400d7b2db81605e512f0d1dcc
qpid-java-common-0.18-2.el6.noarch.rpm SHA-256: ee691966be99d5979bd4504b5104147de7526f4483560ce84a2d7d709d3b2467
qpid-java-example-0.18-2.el6.noarch.rpm SHA-256: 5f142fe213db0813d56466d098dfa07031484dd7627a62d9569a8be976475409
qpid-jca-0.18-2.el6.noarch.rpm SHA-256: a484f2e6926b64f308d9afe639d873813f7325d93fc413b602f8aa015159557f
qpid-jca-xarecovery-0.18-2.el6.noarch.rpm SHA-256: e276055b4c53c23d7c0b820927e957f07b79fe41ab90e6595a9348ae8323d885
qpid-qmf-debuginfo-0.14-14.el6_3.x86_64.rpm SHA-256: 62a2c25189f1be24a5873bc32e64563f49adeab498abeea1ea95a73578e72a3f
qpid-qmf-devel-0.14-14.el6_3.x86_64.rpm SHA-256: d4d4300081ac15d6c273972cfb31065d29cf9222d874d671f0beb3ee27af17e0
xerces-c-3.0.1-20.el6.x86_64.rpm SHA-256: 0ddb7e6d93d45325ab93d5b812eb15b8e736483efaa0d2f9eb8c4d6a0ab020f7
xerces-c-debuginfo-3.0.1-20.el6.x86_64.rpm SHA-256: d5b2bbc3c74bc9a527a376133faaa1bbfd8366e3d0d221f4019439ab5adc3967
xerces-c-devel-3.0.1-20.el6.x86_64.rpm SHA-256: 81eacd6d29ff996c131159aa039ad8b6c56d596cdd62324136554d6cfbc13f32
xerces-c-doc-3.0.1-20.el6.noarch.rpm SHA-256: 1cac04dfbd181b5e4e1090dfb177e36f3a88b3838dafa6ceb67b5d4bf4319199
xqilla-2.2.3-8.el6.x86_64.rpm SHA-256: ffef18db7f7017df82a222fb5fa8d180a8134438572e57825073ce0c1d7b2cb7
xqilla-debuginfo-2.2.3-8.el6.x86_64.rpm SHA-256: df0e0c42749140d6882c27fd9ef5532b05c903d2e11bd470127b8d1f4962f00c
xqilla-devel-2.2.3-8.el6.x86_64.rpm SHA-256: 85760a4b108901da1c0579194884c6eefed7115b565686bc7aa52b23f8f18d64
xqilla-doc-2.2.3-8.el6.noarch.rpm SHA-256: b8f6efb5b84fb250c2b592cd94ea53f36dba62cd94aec57e39abf5b7f8bfd488
i386
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663
qpid-cpp-client-devel-0.14-22.el6_3.i686.rpm SHA-256: 45551705fe55215e66a7c148294a09c991e3e31c996b00489e0b8a4938f91030
qpid-cpp-client-devel-docs-0.14-22.el6_3.noarch.rpm SHA-256: f86e1131a9ec2f96d24c812c6659dce4665eccd2d18bc83ca10ff40582d1ac16
qpid-cpp-client-rdma-0.14-22.el6_3.i686.rpm SHA-256: 4f7a4e07363b8e27c6bf767bd228a677cfcf0e970416921f8b374d92e97a732e
qpid-cpp-debuginfo-0.14-22.el6_3.i686.rpm SHA-256: d0089ae50ef3a7d9807cbb574c6ba5573ac9fad41c94c1dff168a08e5e8bfab7
qpid-cpp-server-cluster-0.14-22.el6_3.i686.rpm SHA-256: 91f7cbc5847778ae9ecca614236c4d00a88a9d24deb72c44d359b0d883aab798
qpid-cpp-server-devel-0.14-22.el6_3.i686.rpm SHA-256: 5522bd2373192f0f621aae8f6222468ab8de208e6fc1e02d64b16aaf8e2ef7ff
qpid-cpp-server-rdma-0.14-22.el6_3.i686.rpm SHA-256: 8d96725c100b8d54fbe49abc5cb6735d08f05c60f9e60ec94ca46d7731c94719
qpid-cpp-server-store-0.14-22.el6_3.i686.rpm SHA-256: ca4304be1565c1fe69ff000029fa6211cedd30cf6f9be335b00d336cb5de1659
qpid-cpp-server-xml-0.14-22.el6_3.i686.rpm SHA-256: 647af8458218c63c9f059a7ca9d3402c8a392afd8137e9c960677be304008803
qpid-java-client-0.18-2.el6.noarch.rpm SHA-256: a75cd1690741780d05bdacb67284eeb3e9ab839400d7b2db81605e512f0d1dcc
qpid-java-common-0.18-2.el6.noarch.rpm SHA-256: ee691966be99d5979bd4504b5104147de7526f4483560ce84a2d7d709d3b2467
qpid-java-example-0.18-2.el6.noarch.rpm SHA-256: 5f142fe213db0813d56466d098dfa07031484dd7627a62d9569a8be976475409
qpid-jca-0.18-2.el6.noarch.rpm SHA-256: a484f2e6926b64f308d9afe639d873813f7325d93fc413b602f8aa015159557f
qpid-jca-xarecovery-0.18-2.el6.noarch.rpm SHA-256: e276055b4c53c23d7c0b820927e957f07b79fe41ab90e6595a9348ae8323d885
qpid-qmf-debuginfo-0.14-14.el6_3.i686.rpm SHA-256: 61dccc5e0ceb79ecdb9ea834ad0b8bf5790e587736266c94a51d3ae0b37c0ea6
qpid-qmf-devel-0.14-14.el6_3.i686.rpm SHA-256: 3768a04d82e910891e0c3ece015d5ad16ec022a303bf545ade8fbd4740a3e46b
xerces-c-3.0.1-20.el6.i686.rpm SHA-256: c1bb9eaf555d6fbfd73bc66ae0c8c82a14721daa221585f72c782c3881ef35bf
xerces-c-debuginfo-3.0.1-20.el6.i686.rpm SHA-256: 09f271423c0238f0ea9c30659b0008d2b1a872107b5512719f92fc9b9c9e77d9
xerces-c-devel-3.0.1-20.el6.i686.rpm SHA-256: 55b93390e9ba9e774917ce452913a229373fecae91f800d1e477f1b7c55e7d03
xerces-c-doc-3.0.1-20.el6.noarch.rpm SHA-256: 1cac04dfbd181b5e4e1090dfb177e36f3a88b3838dafa6ceb67b5d4bf4319199
xqilla-2.2.3-8.el6.i686.rpm SHA-256: 5112d521e880d94d42ff55eba6b2b05a549be97ea6de575a2b6bdaef3c119514
xqilla-debuginfo-2.2.3-8.el6.i686.rpm SHA-256: 9776dcea3677c0861d31d1e042ab819955a55935dbad0f6ced02208422649fcf
xqilla-devel-2.2.3-8.el6.i686.rpm SHA-256: cf1ea40727277ed12cd0952d2032bc59c393dbd4400c8bd4b6bdf727f6acb745
xqilla-doc-2.2.3-8.el6.noarch.rpm SHA-256: b8f6efb5b84fb250c2b592cd94ea53f36dba62cd94aec57e39abf5b7f8bfd488

MRG Grid 2 for RHEL 6

SRPM
mrg-release-2.2.0-1.el6.src.rpm SHA-256: 200a886631724612a4cfd8eeb3d69f0908a08132b1bd759b784d5b4531e5fc73
x86_64
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663
i386
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663

MRG Grid Execute 2

SRPM
mrg-release-2.2.0-1.el6.src.rpm SHA-256: 200a886631724612a4cfd8eeb3d69f0908a08132b1bd759b784d5b4531e5fc73
xerces-c-3.0.1-20.el6.src.rpm SHA-256: 41e575832f2aff24415a157704257600f4cb9a178f57813a699631698f481e4a
xqilla-2.2.3-8.el6.src.rpm SHA-256: 358a59b6a03580a9ca77e5e470a2ad52d71295661f12c3a3944626bd86393591
x86_64
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663
xerces-c-3.0.1-20.el6.x86_64.rpm SHA-256: 0ddb7e6d93d45325ab93d5b812eb15b8e736483efaa0d2f9eb8c4d6a0ab020f7
xerces-c-devel-3.0.1-20.el6.x86_64.rpm SHA-256: 81eacd6d29ff996c131159aa039ad8b6c56d596cdd62324136554d6cfbc13f32
xerces-c-doc-3.0.1-20.el6.noarch.rpm SHA-256: 1cac04dfbd181b5e4e1090dfb177e36f3a88b3838dafa6ceb67b5d4bf4319199
xqilla-2.2.3-8.el6.x86_64.rpm SHA-256: ffef18db7f7017df82a222fb5fa8d180a8134438572e57825073ce0c1d7b2cb7
xqilla-devel-2.2.3-8.el6.x86_64.rpm SHA-256: 85760a4b108901da1c0579194884c6eefed7115b565686bc7aa52b23f8f18d64
xqilla-doc-2.2.3-8.el6.noarch.rpm SHA-256: b8f6efb5b84fb250c2b592cd94ea53f36dba62cd94aec57e39abf5b7f8bfd488
i386
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663

MRG Grid from RHUI 2 for RHEL 6

SRPM
x86_64

MRG Management 2

SRPM
mrg-release-2.2.0-1.el6.src.rpm SHA-256: 200a886631724612a4cfd8eeb3d69f0908a08132b1bd759b784d5b4531e5fc73
x86_64
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663
i386
mrg-release-2.2.0-1.el6.noarch.rpm SHA-256: a43578defd0c077232ddc2730a58f8041e595e75c4e76cdbe4930cfd5048b663

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility