- Issued:
- 2016-10-11
- Updated:
- 2016-10-11
RHBA-2016:2049 - Bug Fix Advisory
Synopsis
Red Hat Enterprise MRG Messaging 3.2.2 Bug Fix Release
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Red Hat Enterprise MRG Messaging 3.2 packages are now available Red Hat Enterprise Linux 6.
Description
Red Hat Enterprise MRG is a next-generation IT infrastructure incorporating
Messaging, Realtime, and Grid functionality. It offers increased performance,
reliability, interoperability, and faster computing for enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux based on
AMQP (Advanced Message Queuing Protocol), an open protocol standard for
enterprise messaging that is designed to make mission critical messaging widely
available as a standard service, and to make enterprise messaging interoperable
across platforms, programming languages, and vendors.
MRG Messaging includes AMQP messaging broker; AMQP client libraries for C++,
Java JMS, and Python; as well as persistence libraries and management tools.
These updated packages for Red Hat Enterprise Linux 6 include numerous bug fixes and enhancements for the Messaging component of MRG.
Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise MRG Messaging 3.2 Release Notes document for detailed information on these changes: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_MRG/3/html/3.2_MRG_Messaging_Release_Notes/index.html
Users of Red Hat Enterprise MRG Messaging 3.2 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated
packages.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise MRG Messaging 3 x86_64
- Red Hat Enterprise MRG Messaging 3 i386
Fixes
- BZ - 1146849 - Re-subscribing to auto-delete queue fails when the queue is just being deleted
- BZ - 1316507 - [C++ client] Message::setContent("") does not work
- BZ - 1318180 - [MRG2] memory leak in primary broker when overwriting messages in a ring queue
- BZ - 1324845 - Federation does not interoperate between MRG-M 2 and 3
- BZ - 1329582 - consuming messages from priority ring queue on backup broker can trigger broker segfault
- BZ - 1330539 - client does not update credit for expired messages
- BZ - 1333437 - segfault when rerouting and deleting a queue in parallel
- BZ - 1333767 - Occasional segfault when creating&deleting many queues just before primary failover
- BZ - 1339449 - [RFE] Improved broker logging for expired messages
- BZ - 1350023 - Memory leak in primary broker when creating&unsubscribing from an autoDel queue in a loop
- BZ - 1359506 - Small memory leak when trying to over-subscribe queue with exclusive subscription
CVEs
(none)
References
(none)
Red Hat Enterprise MRG Messaging 3
SRPM | |
---|---|
qpid-cpp-0.34-17.el6.src.rpm | SHA-256: 90c9f85bfa1506ac28731d6c6c9f7fb460ddfd90e96b2d6721e14e41f4f6dd8a |
qpid-tools-0.34-2.el6.src.rpm | SHA-256: f894129ab5c4862913310259fb52a48db185c965054c561bcfda9bce6c68ee6b |
x86_64 | |
qpid-cpp-client-0.34-17.el6.i686.rpm | SHA-256: 55c429f58489b42a9340c92ce1dd731d627f99d4b380e55f8259a34f1e141741 |
qpid-cpp-client-0.34-17.el6.x86_64.rpm | SHA-256: 9eba1a6ee6ad59539d669de377bfe47cba28cd93c8d4fcfdf6fdc7498754d420 |
qpid-cpp-client-devel-0.34-17.el6.x86_64.rpm | SHA-256: ff3588c8bc34ffd780ec9f6bfb9a3104663d8bc5928ccc652b7bb10946ec00bd |
qpid-cpp-client-devel-docs-0.34-17.el6.noarch.rpm | SHA-256: 4dea2fd7a19f23c90f54808ee15a94be8462117f90c4a4a18a31f6cc9cfe1c90 |
qpid-cpp-client-rdma-0.34-17.el6.x86_64.rpm | SHA-256: f12b6c1822a410d4ece73935bce8f788174c27c09e244efeccea56f543dcd85f |
qpid-cpp-debuginfo-0.34-17.el6.i686.rpm | SHA-256: 2ec33d292907ce73bfc230958dc71cfc37df00fad2ae1806cd534a678fbe4367 |
qpid-cpp-debuginfo-0.34-17.el6.x86_64.rpm | SHA-256: d5e3b82c6ff457a77af2d6abf9d985a218f862fd0a108ed318738283e26ab1be |
qpid-cpp-server-0.34-17.el6.i686.rpm | SHA-256: dccbb28d9a6352aebce63c749cdbdfecccfe274355d4b11e52446ae2993be7db |
qpid-cpp-server-0.34-17.el6.x86_64.rpm | SHA-256: f9b16065037f1b0c2ac7be8dd300bca63054754ba167e386f7eb506e057d7511 |
qpid-cpp-server-devel-0.34-17.el6.x86_64.rpm | SHA-256: 69e96b12196a1c429b2430aae03dd4471f8467734c98b6fdc23b5e097127f310 |
qpid-cpp-server-ha-0.34-17.el6.x86_64.rpm | SHA-256: a1a35b1b88c79f0973e01cecbc34b543945748b7a33e9d577c492e2b582c912c |
qpid-cpp-server-linearstore-0.34-17.el6.x86_64.rpm | SHA-256: 005784011361a6ce7070e315f8d80e831e7963fb95d8bb71ae088f67f8e25c07 |
qpid-cpp-server-rdma-0.34-17.el6.x86_64.rpm | SHA-256: 1e1c3b1ce2ec534fc7d37419a8d9b0f89900ee449ffb44bde45c78095be299f4 |
qpid-cpp-server-xml-0.34-17.el6.x86_64.rpm | SHA-256: fb79b4350180b9c2d3c041e8eba548160f9739d479b498ecfcc1e533e85f88a9 |
qpid-tools-0.34-2.el6.noarch.rpm | SHA-256: 0331702544e409bc0e79abef35fc2d7f529cc41cbf85d9ed6d010cfbcdb84ecb |
i386 | |
qpid-cpp-client-0.34-17.el6.i686.rpm | SHA-256: 55c429f58489b42a9340c92ce1dd731d627f99d4b380e55f8259a34f1e141741 |
qpid-cpp-client-devel-0.34-17.el6.i686.rpm | SHA-256: facb07d452ea422c5de01e055f3a3d89d175f9198e4cbac017414fbbad66a3f6 |
qpid-cpp-client-devel-docs-0.34-17.el6.noarch.rpm | SHA-256: 4dea2fd7a19f23c90f54808ee15a94be8462117f90c4a4a18a31f6cc9cfe1c90 |
qpid-cpp-client-rdma-0.34-17.el6.i686.rpm | SHA-256: 9e4159ec554298b63674fa0a18e5ca86122c22d0160879c062af559e6d493cec |
qpid-cpp-debuginfo-0.34-17.el6.i686.rpm | SHA-256: 2ec33d292907ce73bfc230958dc71cfc37df00fad2ae1806cd534a678fbe4367 |
qpid-cpp-server-0.34-17.el6.i686.rpm | SHA-256: dccbb28d9a6352aebce63c749cdbdfecccfe274355d4b11e52446ae2993be7db |
qpid-cpp-server-devel-0.34-17.el6.i686.rpm | SHA-256: 23b35b48d5a9073e29a473e062b180494037d6e8e3087809ee0f00baefa2828d |
qpid-cpp-server-ha-0.34-17.el6.i686.rpm | SHA-256: bbdc3aa39e40ebe384021804e997930cc7995271ccf2751dfe6ea3dc7fc8ad7f |
qpid-cpp-server-linearstore-0.34-17.el6.i686.rpm | SHA-256: 83225b6208d454bc53aa13857eae0f239da45b6dc1bea25d8d3c54a94c06de54 |
qpid-cpp-server-rdma-0.34-17.el6.i686.rpm | SHA-256: 2db5fdba0ad51ae8776801bcc5b0a1aa0df0973054a8b6d84d2170acfed3eb1e |
qpid-cpp-server-xml-0.34-17.el6.i686.rpm | SHA-256: f0ff6c8e5b62afc03c9d66627492756d5061a0997c1813fd50a1f8b168d57594 |
qpid-tools-0.34-2.el6.noarch.rpm | SHA-256: 0331702544e409bc0e79abef35fc2d7f529cc41cbf85d9ed6d010cfbcdb84ecb |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.