- Issued:
- 2016-03-14
- Updated:
- 2016-03-14
RHBA-2016:0443 - Bug Fix Advisory
Synopsis
Red Hat Enterprise MRG Messaging 3.2.1 Bug Fix Release
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Red Hat Enterprise MRG Messaging 3.2 packages are now available Red Hat Enterprise Linux 6.
Description
Red Hat Enterprise MRG is a next-generation IT infrastructure incorporating
Messaging, Realtime, and Grid functionality. It offers increased performance,
reliability, interoperability, and faster computing for enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux based on
AMQP (Advanced Message Queuing Protocol), an open protocol standard for
enterprise messaging that is designed to make mission critical messaging widely
available as a standard service, and to make enterprise messaging interoperable
across platforms, programming languages, and vendors.
MRG Messaging includes AMQP messaging broker; AMQP client libraries for C++,
Java JMS, and Python; as well as persistence libraries and management tools.
These updated packages for Red Hat Enterprise Linux 6 include a bug
fix for the Messaging component of MRG.
It was found that any message property declared as an unsigned 16 bit integer would get converted to an unsigned 8 bit value in the broker. If the value was greater than 255, an error would occur in the conversion.
The code has been updated to ensure the conversion performs as expected and unsigned 16 bit integer values in the message header are now correctly maintained in the broker.(BZ#11301359)
Users of Red Hat Enterprise MRG Messaging 3.2 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated
packages.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise MRG Messaging 3 x86_64
- Red Hat Enterprise MRG Messaging 3 i386
Fixes
- BZ - 1301359 - uint16 message properties decoded as uint8
CVEs
(none)
Red Hat Enterprise MRG Messaging 3
SRPM | |
---|---|
qpid-cpp-0.34-6.el6.src.rpm | SHA-256: e1901330af156a481b2a8fd08a775af408704f34ac038bbd35657c0c6a0cec8d |
x86_64 | |
qpid-cpp-client-0.34-6.el6.i686.rpm | SHA-256: dbeb416bbb4cd3ff2ac9c9c759dbdd22a14ade7bd244e66659519f5478b9bbc8 |
qpid-cpp-client-0.34-6.el6.x86_64.rpm | SHA-256: 08ba8e09293dccc6cd9861416ae4fc7ea5797a587d7e9e0e4e136dc7ee3eae09 |
qpid-cpp-client-devel-0.34-6.el6.x86_64.rpm | SHA-256: 8e908b1f2a3eb231b0f13a52db27ca8f6fe62c0a2ee9f523fc8bc356605f9eb7 |
qpid-cpp-client-devel-docs-0.34-6.el6.noarch.rpm | SHA-256: 4d0196595d49834365bc9e1af67933649fa1bea40e26e7b14e6b6c8d7490cff5 |
qpid-cpp-client-rdma-0.34-6.el6.x86_64.rpm | SHA-256: b5801c7d030c1aed3b647feceae02b06b520236dc571025120ebfb8a0249393c |
qpid-cpp-debuginfo-0.34-6.el6.i686.rpm | SHA-256: 487d6cada820ccd94e7e6179538efa7c5706f90d7885fd034a0ba396f42e161d |
qpid-cpp-debuginfo-0.34-6.el6.x86_64.rpm | SHA-256: d80040b16edba45c070713b58b3d472e146377dd0efaf93e346acaf7121227cd |
qpid-cpp-server-0.34-6.el6.i686.rpm | SHA-256: 31e3d627545d11684dcae4a1fe5dbe19af0747e2eadb934f1c83b2ec35f20c8e |
qpid-cpp-server-0.34-6.el6.x86_64.rpm | SHA-256: 251e7a642f31d042185c2e64791a07887a37b8832d3600ff1c4faebea4698608 |
qpid-cpp-server-devel-0.34-6.el6.x86_64.rpm | SHA-256: 504d1a7316b59dc7fa4c84a8c7f2c299c054f73249eec897b2c4d817c7423f18 |
qpid-cpp-server-ha-0.34-6.el6.x86_64.rpm | SHA-256: 205322751a5251c30effba151eeb385916b37673cc7c6ef65e9f54551c312740 |
qpid-cpp-server-linearstore-0.34-6.el6.x86_64.rpm | SHA-256: e0d787f7ecf2ceb7c5d56e9a51e08a3407ad23f0498071d30b39ed8e12970f63 |
qpid-cpp-server-rdma-0.34-6.el6.x86_64.rpm | SHA-256: 59e75bf421f122cbc6ac7ef74d4ed81c9be54b903cbb4a4a658932ca8a1f17d2 |
qpid-cpp-server-xml-0.34-6.el6.x86_64.rpm | SHA-256: 303f0b39fd76511e815594d658be7739df80acc0ad603e5729cb7c4d0ee19a3a |
i386 | |
qpid-cpp-client-0.34-6.el6.i686.rpm | SHA-256: dbeb416bbb4cd3ff2ac9c9c759dbdd22a14ade7bd244e66659519f5478b9bbc8 |
qpid-cpp-client-devel-0.34-6.el6.i686.rpm | SHA-256: eee8e06bfa779caf05360cec46eec4f7661e29310836b3605376ab8105c4752a |
qpid-cpp-client-devel-docs-0.34-6.el6.noarch.rpm | SHA-256: 4d0196595d49834365bc9e1af67933649fa1bea40e26e7b14e6b6c8d7490cff5 |
qpid-cpp-client-rdma-0.34-6.el6.i686.rpm | SHA-256: 82abc8bfafffd1246f3aa60e8c97b42a5a4ce0bbddfdfddfddc68187eca5dd85 |
qpid-cpp-debuginfo-0.34-6.el6.i686.rpm | SHA-256: 487d6cada820ccd94e7e6179538efa7c5706f90d7885fd034a0ba396f42e161d |
qpid-cpp-server-0.34-6.el6.i686.rpm | SHA-256: 31e3d627545d11684dcae4a1fe5dbe19af0747e2eadb934f1c83b2ec35f20c8e |
qpid-cpp-server-devel-0.34-6.el6.i686.rpm | SHA-256: 3b64ae90b04f138df49e0a5be99a802606fbfb780eb1a1188555aeef13d88de4 |
qpid-cpp-server-ha-0.34-6.el6.i686.rpm | SHA-256: 8686cf5b299ac7ab0f9deb6566f04d867f2fb7765ac16a50c924c81f057534ea |
qpid-cpp-server-linearstore-0.34-6.el6.i686.rpm | SHA-256: b9e7d7dd51f50b8360ca0a29aeaf7ea6c9308ca42cdaff865bfa2cf615428bc5 |
qpid-cpp-server-rdma-0.34-6.el6.i686.rpm | SHA-256: c23c9c3f0cf348e78de0bc2c65883e24b7d5188f2c7d0fbca29014df8518a0d5 |
qpid-cpp-server-xml-0.34-6.el6.i686.rpm | SHA-256: 7805d7e8da73b7a9c647e67bb658c052917972787c0224f8dc01dca680a664ff |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.