Skip to navigation

Security Advisory Moderate: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update

Advisory: RHSA-2012:0529-1
Type: Security Advisory
Severity: Moderate
Issued on: 2012-04-30
Last updated on: 2012-04-30
Affected Products: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5)
CVEs (cve.mitre.org): CVE-2011-3620

Details

Updated Messaging packages that resolve one security issue, fix multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2.1 for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.

MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.

It was found that Qpid accepted any password or SASL mechanism, provided
the remote user knew a valid cluster username. This could give a remote
attacker unauthorized access to the cluster, exposing cluster messages and
internal Qpid/MRG configurations. (CVE-2011-3620)

Note: If you are using an ACL, the cluster-username must be allowed to
publish to the qpid.cluster-credentials exchange. For example, if your
cluster-username is "foo", in your ACL file:

acl allow foo@QPID publish exchange name=qpid.cluster-credentials

The CVE-2011-3620 fix changes the cluster initialization protocol. As such,
the cluster with all new version brokers must be restarted for the changes
to take effect. Refer below for details.

These updated packages provide numerous enhancements and bug fixes for the
Messaging component of MRG. Space precludes documenting all of these
changes in this advisory. Documentation for these changes will be available
shortly in the Technical Notes document linked to in the References
section.

All users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are
advised to upgrade to these updated packages, which resolve the issues and
add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.
After installing the updated packages, stop the cluster by either running
"service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one
of the cluster nodes. Once stopped, restart the cluster with
"service qpidd start" on all nodes for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5)

SRPMS:
condor-7.6.5-0.14.el5.src.rpm
File outdated by:  RHSA-2013:1295
    MD5: 4a58236d5de13e34f82122922e17ad61
SHA-256: e09fe76eb25c18dc21af0a289e84ece94a89914474b7c500234c31c03b20411e
python-qpid-0.14-6.el5.src.rpm
File outdated by:  RHBA-2014:0129
    MD5: 6a0ad349d5cd084cc3a02d8f2e5a832b
SHA-256: fa80c1495db7610e20c7193dcf097028db45ff1468b95703979f9cdfd4a7687a
qpid-cpp-mrg-0.14-14.el5.src.rpm
File outdated by:  RHBA-2014:0129
    MD5: 8b458b37fe909aac92521adcac5bfa9f
SHA-256: 104c1af7ffbb8269a7101eb8c58c26f64f1f10272080a383fb241771f5e4173f
qpid-java-0.14-3.el5.src.rpm
File outdated by:  RHBA-2013:1023
    MD5: 5f568a3259e07d217a5195737a75b8dd
SHA-256: f9726dfd806e5b404f91a2d6fa0a0f0fcabc0ba1f1802e94841755def071819d
qpid-jca-0.14-9.el5.src.rpm
File outdated by:  RHSA-2013:0561
    MD5: 88798dedd8cca74e07f84e08f680677b
SHA-256: 87d4c698ef2d5f235fb678862506c111b0708ccb374af97ce498ffe8ae49ec36
qpid-qmf-0.14-9.el5.src.rpm
File outdated by:  RHBA-2014:0129
    MD5: 5fe82771afe118cb969449f937e44d23
SHA-256: 868f365a10ffc372139493f56602c7a2ce8f4550ea6503f7cb5789aaa4303b52
qpid-tests-0.14-1.el5.src.rpm
File outdated by:  RHSA-2013:0561
    MD5: 1218fd543e8f6714ba44306dd85bf702
SHA-256: a681694ba90a830d1394d10903e0cedcf37444baf1a335f3afe1766bba1ee769
qpid-tools-0.14-2.el5.src.rpm
File outdated by:  RHBA-2013:1023
    MD5: b402d28f1ec5118a5b40fb18652809c5
SHA-256: 4166ef0f9424e1b7eb0478b5d38c3139ccbc7a58221eab12f9cd69941646a64f
sesame-1.0-3.el5.src.rpm
File outdated by:  RHSA-2013:0564
    MD5: be1f25f5fa64ff2c7a94d1cd77f4223b
SHA-256: 25075e6007a716eb5ae7c83989cbe11220b5dd47c7d2c468b2e155184bd3ac92
 
IA-32:
condor-7.6.5-0.14.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: a54cc89a935da8073c185ece9c2dc642
SHA-256: 6f8826f10d8ac2244a95b2d5955c5dc40b38b6048fc79622c4a3a8aea6162465
condor-aviary-7.6.5-0.14.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: 2e8f995b70f4a75b004c6b84ccc4b16d
SHA-256: 662b43ff9f45ef4c6cd16240857814b6166d8444c3c80af2cda0519746e3fa86
condor-classads-7.6.5-0.14.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: 28d6b3d3670579a8a2bbe7fb6f847d96
SHA-256: 461ff31b91cc80d297cf8d3c25644286f3a54eaac065af2fe22028400b8c256b
condor-kbdd-7.6.5-0.14.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: b7d6954136238404f4003b17a3dd1cf0
SHA-256: 6233f6982686903f59e56f8ec6afee3fa662c1193aad6e99db55400701076d2a
condor-qmf-7.6.5-0.14.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: c990f8aefb9c024405af0a79c40032b9
SHA-256: 1534a577cf06d1d3710abbcac751ded568cc0b4758c07f9d236108130e01713b
condor-vm-gahp-7.6.5-0.14.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: a0b6577b871432a86956c0938db8e7b3
SHA-256: 218457242211f1c2cb645797d26d2f026c58ea03f5fc3373bdcd33b6cfdf048e
python-qpid-0.14-6.el5.noarch.rpm
File outdated by:  RHBA-2014:0129
    MD5: 746a508532a9da275022d69fb41b9e33
SHA-256: d9ba25f7aa102b88b8ffd14d626bfda7392ae006e409636036af050b61ee041a
python-qpid-qmf-0.14-9.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: 93146724889d2cb8e82db4922db99d90
SHA-256: bced3922acaacf82d278ab1a94a7cdfe0ff7dd5fe3a81ac7f415dbcd51f7b31f
qpid-cpp-client-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: 069c65dbe11879906183a9946390fd9b
SHA-256: 277b07e219a4974ffe9d4f290956916ce0c265ab12b08e7a1f73c09a95bfbe1d
qpid-cpp-client-devel-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: cffbf869004cc45d62bace502caf771a
SHA-256: 35452c1adccef24deb70c00ef4827c2b145725a968d9f2c971b12ff4ea359ea0
qpid-cpp-client-devel-docs-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: 0e5e1a86fe8f35e24faaac57bd1e7090
SHA-256: b99b99ce7c944317fecb715908803ebf270df3ce404e6225466101308ef5c384
qpid-cpp-client-rdma-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: b3a56a0bcc30bbbe4875a1a7aefe4b39
SHA-256: 26b1871c59735250cd1da28511ab4bc03a78a23b5c70be454902525175302125
qpid-cpp-client-ssl-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: beb09701ab7c0cc3626e12cfe1672d7e
SHA-256: b81e923a2794602cec0f618e136acb5beaae0d594eae241efa4eba6fe6c59e07
qpid-cpp-server-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: dd374534c280216580c2b6c71d9cc2d6
SHA-256: 8b9ce950f2acdfc252f02a07d39d0a169ab12707da516c0d4ad4a096d2fec9e7
qpid-cpp-server-cluster-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: 2b6c966fdb11bead15d8ed78e4fa8ff0
SHA-256: 3cab17ec877afba8dba8a38ec914ba301c5dffd966976764cba4c26ce7b90cf4
qpid-cpp-server-devel-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: ec61ad510f781a849d9be3cf2ea9701f
SHA-256: bcf6082d26625e74e977e37de3bf5b61e109ee91a15e2035439331d4c559c02e
qpid-cpp-server-rdma-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: a3e4330bf7b5bbe6510d19b771b9a1d7
SHA-256: bf283ea4f0d866c6b04a9f79dc43e921eed54f114c74e02db59056099d10642e
qpid-cpp-server-ssl-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: 417e1007874811bf23906e6ecdd589fe
SHA-256: 49458c9303e55f15c57b33380a6245a1fb063613a8212d0803bfae53e77c2f98
qpid-cpp-server-store-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: 29d1bd0841db31b743072be1c1d02fc2
SHA-256: 2e31b2249eeb0153fff020106c7dc798e748658a601b13883600e16ea4d77ad9
qpid-cpp-server-xml-0.14-14.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: ddca0dadd28748a87812f8eb19332efb
SHA-256: c013f0d2279b50437b15ce383867c01882f780bf344bc8de765fc73d12980ea4
qpid-java-client-0.14-3.el5.noarch.rpm
File outdated by:  RHBA-2013:1023
    MD5: 0838168937f37e227fbc3ff97de10bfc
SHA-256: 8e2e45d5fae6d1fa03983c832738d0027fd4dd624cbfe74c278bdef5ea0c3264
qpid-java-common-0.14-3.el5.noarch.rpm
File outdated by:  RHBA-2013:1023
    MD5: c3f17b9905e4d594b07d04a42c4b4123
SHA-256: 81dc4367c3d925c61a9c6862dcd065049a6ac10c5789e145dd621b5d6c0e82f1
qpid-java-example-0.14-3.el5.noarch.rpm
File outdated by:  RHBA-2013:1023
    MD5: b79fd283f15c834f52d8037816446964
SHA-256: 92c721cc385aa0f7fcd138142ce517a8c8564a85441202f70a18e526a3ee6053
qpid-jca-0.14-9.el5.noarch.rpm
File outdated by:  RHSA-2013:0561
    MD5: a2bce4ebdb9783fcbe7b0dfa46e1a8f8
SHA-256: 59d598296edf143167628709bd7afcf0574e5cf65c232cc105ce6cd0a281e8f4
qpid-jca-xarecovery-0.14-9.el5.noarch.rpm
File outdated by:  RHSA-2013:0561
    MD5: 95eb3d609918de5d454c16b36cf10775
SHA-256: 6e30a04087eca8ff2e8b7708b5cfd09889aa74105b8e0abfc12cb0c961080bed
qpid-qmf-0.14-9.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: 390241f086ae103f2dcd3ab4abea73eb
SHA-256: e489ffe8ec523bb97bbf39025b4771ed4a89ecdc057c3cadba4e79e08b61b40f
qpid-qmf-devel-0.14-9.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: 869f6818fbf450bc6cc19fbee1f77708
SHA-256: 6d87f2397d8c4adea7c79fe31a9569e2f560e5dd3ca0c9fed18c6abeec08597c
qpid-tests-0.14-1.el5.noarch.rpm
File outdated by:  RHSA-2013:0561
    MD5: 97ab83fb8b06b89e61d1fe5a3d2289ac
SHA-256: 57574ee7c68a70f4c71da8274c9a60f8ef43e6038ebf252a2a9102eabfdf372e
qpid-tools-0.14-2.el5.noarch.rpm
File outdated by:  RHBA-2013:1023
    MD5: fbff1566b1677ab251617012a40eee75
SHA-256: 38840712058b29f30a15f3536bb2af98277135be4a7990cd6209d14019a1db77
ruby-qpid-qmf-0.14-9.el5.i386.rpm
File outdated by:  RHBA-2014:0129
    MD5: 3bba34d1555d53dc065f350f5848224c
SHA-256: cba40c18112271e44694a18d10abb12c85e0d28f0b8da0cf4f5f5b3150141c86
sesame-1.0-3.el5.i386.rpm
File outdated by:  RHSA-2013:0564
    MD5: 36bf51621743bfa0dd96f615bc6114a7
SHA-256: 716814f84bfa357072b8c8e4069498b066d7d33cb4a1cbb6ca15b3a7e7883bf8
 
x86_64:
condor-7.6.5-0.14.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: 4a4d3da04cb35d944fe3d6e086a7d571
SHA-256: c0e5896454ec8d30633143de1a8dab50a1c42d9e10ae9df96272ed4e050645c7
condor-aviary-7.6.5-0.14.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: ef2c2cac69aa4968138521e5744b64fa
SHA-256: 7d710d079e9c07b5c3f35932ac9002ed6596771d0235d928428714836e1bbe21
condor-classads-7.6.5-0.14.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: 37f0b39ffc54e7d5da4f1cfef3dc0ae8
SHA-256: 1180896417535df12632921144557f5ad881f6a5e5e2b9a43bc37746260efe19
condor-kbdd-7.6.5-0.14.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: 470cfc9fce0f3362682d65d1e2771168
SHA-256: 63e400bafece1165fca6c9b37641c97433df4bc149945b21e1042a783db54430
condor-qmf-7.6.5-0.14.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: cc34c3e6c3c1421c495a45f17b0b7a9a
SHA-256: c69e2b7982b9ad8d0c234c01ca8b7285035e4ad63a6541203a238b63474482c5
condor-vm-gahp-7.6.5-0.14.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: 7898fcaa6b5de3efc1198535169713b8
SHA-256: 3b2658e001a5cc4bb5dd92341c52ed848e9a62bd2515a1ca31d36d92ee1b83f8
python-qpid-0.14-6.el5.noarch.rpm
File outdated by:  RHBA-2014:0129
    MD5: 746a508532a9da275022d69fb41b9e33
SHA-256: d9ba25f7aa102b88b8ffd14d626bfda7392ae006e409636036af050b61ee041a
python-qpid-qmf-0.14-9.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 11fe3c636adb92d6d23e18a3c48d3b28
SHA-256: 018ce437808010be2d82cf96cde9d5752c1d0e230c699813e43c459d3f1e5f37
qpid-cpp-client-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 6360edad5f8eff8c1e590cd6e2fe57a4
SHA-256: 78e99e64be1ffc272115ccd264dd28cfa63b2c3c598b9683fdbcbd08572b5680
qpid-cpp-client-devel-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: f40943eb4ea5d58ebe6d38964755e4c5
SHA-256: 7b2291bd54240ab7ab0ef1cb4e3a39e9fd34514c575f7b15e12bf45fe0cc918a
qpid-cpp-client-devel-docs-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: cf3776816f58e415d650b22ef8bfdac6
SHA-256: 26d57a6ad41c8291e4bff28005698bbf75e2e7032612ecffbbeef49f23e2b8cd
qpid-cpp-client-rdma-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 470a1fd8c3da45f197d1a077b6c3650d
SHA-256: 253e7c8c7cddf7a16cfd5888dbb70d968e7fd53fceb0021274a59e13992977f6
qpid-cpp-client-ssl-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 6ba8503e4b84fb8e8c8c84bcd5d31b77
SHA-256: 034cc8f372c930df8d7258b80b219f7f4373347ba4ef37925b081bd1cac24c11
qpid-cpp-server-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: b2b65cfa20e4c1da836c9a9a217deb96
SHA-256: 6334a4398dbc5bd89d0dfb25454bf84a8f4c21d56d8a58710b36dc050abec6ae
qpid-cpp-server-cluster-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 904fefb8e04b563b8bb76f4a548bc807
SHA-256: e485115832e26036f1699602d7483eb14d42cac284c45b50f5cb59c773dbaee6
qpid-cpp-server-devel-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 68af662cbb005328367fe1f3375fda59
SHA-256: 5e3240e0b2a438b7c7fd4c6fec09f03f93472b515da9bf2aed8cb12e8fba1ddf
qpid-cpp-server-rdma-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 88824c893cfe68dbbfcb08ffdb992c93
SHA-256: e1ac499f36ead30ea0afd2e41d9f01468bf4b18ff75e0b918ee7dc80579966cd
qpid-cpp-server-ssl-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 3ae1501b090ca9586c61a8cd8b69566d
SHA-256: f26eb85b2b13d8bdbafb944cdfebb7df565649a8598d2b31b25572473aa50e56
qpid-cpp-server-store-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 457886cf8d4b36673792844858ee59fc
SHA-256: 6d30e52cf6447a3f8546ab6768f27217edf441663f54d89156492fccd69bcc07
qpid-cpp-server-xml-0.14-14.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: dcc9fdd04b22cd5984214df4b907e3a8
SHA-256: bbc0d910c438c9f4156f9f7f6982347f542c4966642f39383ca6c69c0e535152
qpid-java-client-0.14-3.el5.noarch.rpm
File outdated by:  RHBA-2013:1023
    MD5: 0838168937f37e227fbc3ff97de10bfc
SHA-256: 8e2e45d5fae6d1fa03983c832738d0027fd4dd624cbfe74c278bdef5ea0c3264
qpid-java-common-0.14-3.el5.noarch.rpm
File outdated by:  RHBA-2013:1023
    MD5: c3f17b9905e4d594b07d04a42c4b4123
SHA-256: 81dc4367c3d925c61a9c6862dcd065049a6ac10c5789e145dd621b5d6c0e82f1
qpid-java-example-0.14-3.el5.noarch.rpm
File outdated by:  RHBA-2013:1023
    MD5: b79fd283f15c834f52d8037816446964
SHA-256: 92c721cc385aa0f7fcd138142ce517a8c8564a85441202f70a18e526a3ee6053
qpid-jca-0.14-9.el5.noarch.rpm
File outdated by:  RHSA-2013:0561
    MD5: a2bce4ebdb9783fcbe7b0dfa46e1a8f8
SHA-256: 59d598296edf143167628709bd7afcf0574e5cf65c232cc105ce6cd0a281e8f4
qpid-jca-xarecovery-0.14-9.el5.noarch.rpm
File outdated by:  RHSA-2013:0561
    MD5: 95eb3d609918de5d454c16b36cf10775
SHA-256: 6e30a04087eca8ff2e8b7708b5cfd09889aa74105b8e0abfc12cb0c961080bed
qpid-qmf-0.14-9.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: bc697eb654350abc8a8bd8d603fd187b
SHA-256: ff355873dca41f1de6b6e27ef82c91cea03754a6ca77832f345fa6d9c2a8dd0e
qpid-qmf-devel-0.14-9.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: 3f34fe111327dd6d3911897ac1952643
SHA-256: dc99d24313a148a8ced5881cc783b5c31d9ea5baee04056a69b9753650d58df6
qpid-tests-0.14-1.el5.noarch.rpm
File outdated by:  RHSA-2013:0561
    MD5: 97ab83fb8b06b89e61d1fe5a3d2289ac
SHA-256: 57574ee7c68a70f4c71da8274c9a60f8ef43e6038ebf252a2a9102eabfdf372e
qpid-tools-0.14-2.el5.noarch.rpm
File outdated by:  RHBA-2013:1023
    MD5: fbff1566b1677ab251617012a40eee75
SHA-256: 38840712058b29f30a15f3536bb2af98277135be4a7990cd6209d14019a1db77
ruby-qpid-qmf-0.14-9.el5.x86_64.rpm
File outdated by:  RHBA-2014:0129
    MD5: ada9e5b348e8c03d7badeb7ce9def8bd
SHA-256: b4244752af7638383a54806b9169227480dc71643c69dc20188c6aff03a2ceb7
sesame-1.0-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:0564
    MD5: facfe626eb56c674fa9b895754184415
SHA-256: 45035c130c8a17be8ed8dc04e2a5001fb222a8a4c472e7842abbd291144b69ad
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

650969 - [RFE] qpid-winsdk should support Microsoft Visual Studio 2010
674379 - [RFE] IPv6 support for qpid C++ messaging
691654 - qpidd broker triggers SELinux AVCs avc: denied { search } for pid=27642 comm="qpidd" name="/" dev=sysfs ino=1 scontext=unconfined_u:system_r:qpidd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir
700632 - qpid-java-common rpm erroneously includes qpid-ra-0.10.jar
704596 - The toString() representation of the JMSDestination of a received message is different from the toString() representation on the sender side.
705418 - Ability to acknowledge all messages up to and including a given message for a Session
726102 - cpp client parsing error when dealing with empty strings
727182 - Support DTX transactions in a cluster.
730981 - Unable to create binding while sending messages on default exchange using addressing
731368 - Only one message is consumed using c++ drain by default
733241 - 'qpid-config queues <queue_name>' should return proper error code
733383 - Single message can be delivered to multiple client
734729 - qpidd broker crash during shutdown
735208 - management of store/journal no longer available
747078 - CVE-2011-3620 qpid-cpp: cluster authentication ignores cluster-* settings
751845 - Allow SSL and non-SSL connections on the same port
760112 - Journal management stats not available for recovered queues
760636 - Message Group query method should include message timestamp if present.
761186 - Java client mishandles tcp_nodelay when specified as part of the broker URL


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/