Skip to navigation

Security Advisory Low: Red Hat Enterprise MRG Grid 2.3 security update

Advisory: RHSA-2013:0564-1
Type: Security Advisory
Severity: Low
Issued on: 2013-03-06
Last updated on: 2013-03-06
Affected Products: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5)
CVEs (cve.mitre.org): CVE-2012-4462

Details

Updated Grid component packages that fix one security issue, multiple bugs,
and add various enhancements are now available for Red Hat Enterprise MRG
2.3 for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.

MRG Grid provides high-throughput computing and enables enterprises to
achieve higher peak computing capacity as well as improved infrastructure
utilization by leveraging their existing technology to build high
performance grids. MRG Grid provides a job-queueing mechanism, scheduling
policy, and a priority scheme, as well as resource monitoring and resource
management. Users submit their jobs to MRG Grid, where they are placed into
a queue. MRG Grid then chooses when and where to run the jobs based upon a
policy, carefully monitors their progress, and ultimately informs the user
upon completion.

It was found that attempting to remove a job via
"/usr/share/condor/aviary/jobcontrol.py" with CPROC in square brackets
caused condor_schedd to crash. If aviary_query_server was configured to
listen to public interfaces, this could allow a remote attacker to cause a
denial of service condition in condor_schedd. While condor_schedd was
restarted by the condor_master process after each exit, condor_master would
throttle back restarts after each crash. This would slowly increment to the
defined MASTER_BACKOFF_CEILING value (3600 seconds/1 hour, by default).
(CVE-2012-4462)

The CVE-2012-4462 issue was discovered by Daniel Horak of the Red Hat
Enterprise MRG Quality Engineering Team.

These updated packages for Red Hat Enterprise Linux 5 provide numerous
enhancements and bug fixes for the Grid component of MRG. Some of the most
important enhancements include:

* Release of HTCondor 7.8
* OS integration with control groups (cgroups)
* Kerberos integration and HTML5 interactivity in the management console
* Historical data reporting in the management console as Technology Preview
* Job data availability from MongoDB as Technology Preview
* Updated EC2 AMI and instance tagging support
* Enhanced negotiation and accounting
* Enhanced DAG workflow management
* Enhancements to configuration inspection, node inventory, and
configuration of walk-in or dynamic resources
* High availability for Aviary

Space precludes documenting all of these changes in this advisory. Refer to
the Red Hat Enterprise MRG 2 Technical Notes document, available shortly
from the link in the References section, for information on these changes.

All users of the Grid capabilities of Red Hat Enterprise MRG are advised
to upgrade to these updated packages, which correct this issue, and fix
the bugs and add the enhancements noted in the Red Hat Enterprise MRG 2
Technical Notes.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5)

SRPMS:
condor-7.8.8-0.4.1.el5.src.rpm
File outdated by:  RHSA-2013:1295
    MD5: 478018eb62b368b4013197611f5b35f8
SHA-256: 632de442fc57bde09771daa07936597a2b23ead2d505c55ea29e41b92db1bc8d
condor-ec2-enhanced-1.3.0-2.el5.src.rpm     MD5: 51737997df0b496475b1637523a40dd5
SHA-256: 3609f9e3761022e9f8612e9aca031bc95e1c184402896225def1d50dd502cb2b
condor-ec2-enhanced-hooks-1.3.0-3.el5.src.rpm     MD5: c3d6fb9d1239003f27f8abb21f41c9b5
SHA-256: 0b0d96873dd10ed2a5e51d46e3b07ccba45d5fff0be58593b3be85d472ffe3f6
condor-job-hooks-1.5-6.el5.src.rpm     MD5: c2139147b88ffedbec5f3451ecba10bc
SHA-256: bedabd6d746eab8b164c04e9857b28a3f5ab6f47742668b0aaf5e69a5b0858cc
condor-low-latency-1.2-3.el5.src.rpm     MD5: 3de99b0378232ce5fb52e7c8c537def1
SHA-256: 56dc170d2604fb1701bcf77d06a41f4170137f4f2eaa62f798a43ee90a461b5b
condor-wallaby-5.0.5-2.el5.src.rpm     MD5: 02268757d5ef12ac96b0162d2d65a91e
SHA-256: d198210747f864295981112e7f511df8d70b665ff471e9a7812778958e50d614
condor-wallaby-base-db-1.25-1.el5.src.rpm     MD5: d0748960328a0c05c8c4a8ee32009999
SHA-256: 09a892335f626333af683a9d0459fe09d4b6df4f2f1d0d72358f702e5dcffbdd
cumin-0.1.5675-1.el5.src.rpm
File outdated by:  RHSA-2013:1851
    MD5: 96603daf752a23ac6ebd1953e1163436
SHA-256: 074f88af9eaee243b71d6b323f8c3c8a9ffb3489bac166dfba9f72393a2190c8
python-boto-2.3.0-1.1.el5.src.rpm     MD5: 6705c1d9627d9194434aa676aed0b617
SHA-256: 05844acd6fe9358bb3f07417738ad63de04031413b4c397b4e86eb9d6d5edacf
ruby-rhubarb-0.4.3-5.el5.src.rpm     MD5: f0afa5791ba25a34d335efa4adc98c0b
SHA-256: 7a81c2da6b27b0757653260fcf1263a5046664855116bf3d503947d5e4e9f4ab
ruby-spqr-0.3.6-3.el5.src.rpm     MD5: 34199ca868648091ad4c2b65de833d1e
SHA-256: cd3943378be5600bab4c95e819ec16f6cebdbbcb29c710d1ef89fe89dc7aa442
sesame-1.0-7.el5.src.rpm     MD5: 19177dd67b20baa570a1d4a413cd4bf8
SHA-256: c244c5eb39d1fc88ef0a2574a19fe391edf841923b8b77ed3cc40744c9daf589
wallaby-0.16.3-1.el5.src.rpm     MD5: 461141a15a4b33acd69eba1a56f48324
SHA-256: 379fc1c9b3c6e2e9bb44e399e094ded2b8a59a23ac5a8511b0e78f30d568f67d
 
IA-32:
condor-7.8.8-0.4.1.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: b9a05f847346a00a725c5ecd5398ba7b
SHA-256: 160a4fa7c772d61779d53bcff85a421e1960d2ebe55df510bf25a40ceb06a36e
condor-aviary-7.8.8-0.4.1.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: bfe91571e9afb6a99107fe74df360063
SHA-256: 5c9251c33184ab414e1a9fac356fe707ca053cc7cf3f804664127f116b8df5c0
condor-classads-7.8.8-0.4.1.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: 73785c200c06538ab75735991e0455bb
SHA-256: fde7cabc7c8bd48c1d3a32d784edb44d65c9946438d7dac819688ce43a9462f4
condor-ec2-enhanced-1.3.0-2.el5.noarch.rpm     MD5: 9a3ab84531d0b08f7a885fbfaa042ccf
SHA-256: f8e4c270d427e6ed1dddb241230ac39b467d916d18384c8984714788f3f60a4b
condor-ec2-enhanced-hooks-1.3.0-3.el5.noarch.rpm     MD5: 656cabf96f29b85dc60dd6f1ef8a6250
SHA-256: c845099ac89e94ac728b7afc33465065c7464d699102cf45afe0d75dd2380527
condor-job-hooks-1.5-6.el5.noarch.rpm     MD5: d49af5c9f823b91f3fdfdba53513b0dd
SHA-256: 67565f3de0fa79ddb010cea2fc271ceb17217d77819ee6b7a8ddfad1611bb777
condor-kbdd-7.8.8-0.4.1.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: dc17f3a8c40c60f08a8f329de7a0e6f8
SHA-256: 129fbaec0c4417155a31f528341c32f3f4110051b9f8b79d9d12ea58120d08a2
condor-low-latency-1.2-3.el5.noarch.rpm     MD5: d030e4b23cdb34c750909da2115cc8aa
SHA-256: 43b42555ae57965ac9e9d54ebd2653a70d4e7cdc448b6fcc9b2f583a0c2e363b
condor-qmf-7.8.8-0.4.1.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: 89c8715d848966d076d49ee5fa3da61d
SHA-256: b4a4810653b27f240183a4826dcfa65ca336bffae4667ba9012dba22728b7cac
condor-vm-gahp-7.8.8-0.4.1.el5.i386.rpm
File outdated by:  RHSA-2013:1295
    MD5: 659fe969f17becb8fc038975fdd96486
SHA-256: 2ec95eec66dd06b9c2760c21ec28029b80cf25cefc99ab8b02aa275ab01984f2
condor-wallaby-base-db-1.25-1.el5.noarch.rpm     MD5: 53b124289066df3d4bd26f67b0803d45
SHA-256: 585babe0acf032ecb6f97d1f08e0e89f3510278e755827d2090f371c5dcf271d
condor-wallaby-client-5.0.5-2.el5.noarch.rpm     MD5: fbd4b6bc2abe4f76534d3cf2e9a48f97
SHA-256: 9d35997b1374799f7f5869075f3d0db884dbc6e42661843dcd8a2a5b2815c71d
condor-wallaby-tools-5.0.5-2.el5.noarch.rpm     MD5: 0d624f2d24d2e772f878d49071ebda9e
SHA-256: 7e99bb69e2937bd04b82fc90fb9467bbd6454ecae057f7d6bebd990fdc3b17a9
cumin-0.1.5675-1.el5.noarch.rpm
File outdated by:  RHSA-2013:1851
    MD5: a48b8a2e710fdc66099d217b9ec535b3
SHA-256: 6fe33c2079bc011f233810393aed8a660cf13ec49cde42e86b60e9884ad24224
python-boto-2.3.0-1.1.el5.noarch.rpm     MD5: cf38a9266f2f2e25a152201c932def7d
SHA-256: cb55de9b4e04fd10c86bba58cf6e58cc7baa9d9fe8eec41ee6a1d243b5116031
python-condorec2e-1.3.0-3.el5.noarch.rpm     MD5: 10fc5a23de07d5a38b4f60c519d9bed3
SHA-256: 9ddab231c407c8f093f41e5495504bb43e00d6846beaee6b5659cfc9061a319f
python-condorutils-1.5-6.el5.noarch.rpm     MD5: 7bb85e0795ce5d0e4a868d760ca3f571
SHA-256: e6ac36cf61ded7758fa3d4c51f458627d9947c06827dfe5124b03f8022335f0e
python-wallaby-0.16.3-1.el5.noarch.rpm     MD5: 715bcc7fb63064b14bb307e167a00f04
SHA-256: e9507933bf08467aa9a25884a2e48735e4fefa766af7c96e070a8864549352d2
python-wallabyclient-5.0.5-2.el5.noarch.rpm     MD5: 939590e53f42e84e799bc974e662959d
SHA-256: 6bc1603ed376867f1d2f278e3f457fc521efecafb131e503136889fd9d5ea76a
ruby-condor-wallaby-5.0.5-2.el5.noarch.rpm     MD5: 6aa447188d6d039a883f2195cb6b6a6c
SHA-256: 6fb39b0f6f344b8e01a9a497256980f0cae7166dc63407e3a7337ae3e8d3b881
ruby-rhubarb-0.4.3-5.el5.noarch.rpm     MD5: f59f501636398f5b06f74ffacc8a3a5f
SHA-256: aea99c67c8110137a7fbc8ee77a0de6910c015f752429823354ccd96fb21e992
ruby-spqr-0.3.6-3.el5.noarch.rpm     MD5: 6c8e7509c0847af4183aa6224f978cb7
SHA-256: e4592404b074872f1553aa5a24f49ed5a6776e5d23ecb1b1abf4c49c378c6615
ruby-wallaby-0.16.3-1.el5.noarch.rpm     MD5: 02ad9bb45ae6615c9425e2190bc65d0e
SHA-256: a8819f5c4b8299a3bea607bebe6f0ef6c01fb1ebb29efa8690f0eda3569331ba
sesame-1.0-7.el5.i386.rpm     MD5: b1b2ad82269f62738feece6ae9b15ddc
SHA-256: d7d0d25af8b2937dc529dfdeffa2976e8b36bc9ac4457d8a47a5aedc51961608
spqr-gen-0.3.6-3.el5.noarch.rpm     MD5: 472116e167eef2a68ac7e27486df1f3f
SHA-256: 8f39b96d65fc2b6080d3f38d1762cb5fb765ca9e0a088d5531c3c328a4028ad4
wallaby-0.16.3-1.el5.noarch.rpm     MD5: 3e85f8157b37edd1eb1e672da9a0f402
SHA-256: 7034fe1b5fd2c4e7b5f8d206cc4c3be1eadc52e12adeb38f2f363a0f457c1421
wallaby-utils-0.16.3-1.el5.noarch.rpm     MD5: 921ab27407d2c24ba8ccebaf91cd924f
SHA-256: 10216274337532d6bb566f796b249e923e03afed3ea1ac4331e5ed63a3b83eec
 
x86_64:
condor-7.8.8-0.4.1.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: 7088d9cdccb8605b1444cd3559f9d7b6
SHA-256: 286c7c1abb1d76fc4a598573b860dc51856d2694ca6df59547a791c4c7d806f7
condor-aviary-7.8.8-0.4.1.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: ffd205e86a51f8ff10976a7f01cf544e
SHA-256: 5d0b7a767ee2b6f2605935f550f0c3afbfdcbd2b87b42188abee293eb017374a
condor-classads-7.8.8-0.4.1.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: 8516bf987bca2a4955b99bd77406a252
SHA-256: ee7d5919b71e4d5746208faca56d79e2ec66275d3548aae0f1e1afccd7b41a79
condor-ec2-enhanced-1.3.0-2.el5.noarch.rpm     MD5: 9a3ab84531d0b08f7a885fbfaa042ccf
SHA-256: f8e4c270d427e6ed1dddb241230ac39b467d916d18384c8984714788f3f60a4b
condor-ec2-enhanced-hooks-1.3.0-3.el5.noarch.rpm     MD5: 656cabf96f29b85dc60dd6f1ef8a6250
SHA-256: c845099ac89e94ac728b7afc33465065c7464d699102cf45afe0d75dd2380527
condor-job-hooks-1.5-6.el5.noarch.rpm     MD5: d49af5c9f823b91f3fdfdba53513b0dd
SHA-256: 67565f3de0fa79ddb010cea2fc271ceb17217d77819ee6b7a8ddfad1611bb777
condor-kbdd-7.8.8-0.4.1.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: 25554226ba5c1c0611451a6bd0007a8f
SHA-256: a31f758ae4b009f36bd88469fdeefd5ac87cfb4ec096a26f379735789c061d2f
condor-low-latency-1.2-3.el5.noarch.rpm     MD5: d030e4b23cdb34c750909da2115cc8aa
SHA-256: 43b42555ae57965ac9e9d54ebd2653a70d4e7cdc448b6fcc9b2f583a0c2e363b
condor-qmf-7.8.8-0.4.1.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: 9e327a0ad7c56b5f61e36a9ce89f50fb
SHA-256: e42c359ddba3059b4b917900a7fe56bd1389c87067248e2b0c1506065558fa5a
condor-vm-gahp-7.8.8-0.4.1.el5.x86_64.rpm
File outdated by:  RHSA-2013:1295
    MD5: 978a44a8351cd93fbc1cc0833220b8fd
SHA-256: aa1fc0611f638458ba066a1d10daaa16775e1451735f764935d5deb632453b50
condor-wallaby-base-db-1.25-1.el5.noarch.rpm     MD5: 53b124289066df3d4bd26f67b0803d45
SHA-256: 585babe0acf032ecb6f97d1f08e0e89f3510278e755827d2090f371c5dcf271d
condor-wallaby-client-5.0.5-2.el5.noarch.rpm     MD5: fbd4b6bc2abe4f76534d3cf2e9a48f97
SHA-256: 9d35997b1374799f7f5869075f3d0db884dbc6e42661843dcd8a2a5b2815c71d
condor-wallaby-tools-5.0.5-2.el5.noarch.rpm     MD5: 0d624f2d24d2e772f878d49071ebda9e
SHA-256: 7e99bb69e2937bd04b82fc90fb9467bbd6454ecae057f7d6bebd990fdc3b17a9
cumin-0.1.5675-1.el5.noarch.rpm
File outdated by:  RHSA-2013:1851
    MD5: a48b8a2e710fdc66099d217b9ec535b3
SHA-256: 6fe33c2079bc011f233810393aed8a660cf13ec49cde42e86b60e9884ad24224
python-boto-2.3.0-1.1.el5.noarch.rpm     MD5: cf38a9266f2f2e25a152201c932def7d
SHA-256: cb55de9b4e04fd10c86bba58cf6e58cc7baa9d9fe8eec41ee6a1d243b5116031
python-condorec2e-1.3.0-3.el5.noarch.rpm     MD5: 10fc5a23de07d5a38b4f60c519d9bed3
SHA-256: 9ddab231c407c8f093f41e5495504bb43e00d6846beaee6b5659cfc9061a319f
python-condorutils-1.5-6.el5.noarch.rpm     MD5: 7bb85e0795ce5d0e4a868d760ca3f571
SHA-256: e6ac36cf61ded7758fa3d4c51f458627d9947c06827dfe5124b03f8022335f0e
python-wallaby-0.16.3-1.el5.noarch.rpm     MD5: 715bcc7fb63064b14bb307e167a00f04
SHA-256: e9507933bf08467aa9a25884a2e48735e4fefa766af7c96e070a8864549352d2
python-wallabyclient-5.0.5-2.el5.noarch.rpm     MD5: 939590e53f42e84e799bc974e662959d
SHA-256: 6bc1603ed376867f1d2f278e3f457fc521efecafb131e503136889fd9d5ea76a
ruby-condor-wallaby-5.0.5-2.el5.noarch.rpm     MD5: 6aa447188d6d039a883f2195cb6b6a6c
SHA-256: 6fb39b0f6f344b8e01a9a497256980f0cae7166dc63407e3a7337ae3e8d3b881
ruby-rhubarb-0.4.3-5.el5.noarch.rpm     MD5: f59f501636398f5b06f74ffacc8a3a5f
SHA-256: aea99c67c8110137a7fbc8ee77a0de6910c015f752429823354ccd96fb21e992
ruby-spqr-0.3.6-3.el5.noarch.rpm     MD5: 6c8e7509c0847af4183aa6224f978cb7
SHA-256: e4592404b074872f1553aa5a24f49ed5a6776e5d23ecb1b1abf4c49c378c6615
ruby-wallaby-0.16.3-1.el5.noarch.rpm     MD5: 02ad9bb45ae6615c9425e2190bc65d0e
SHA-256: a8819f5c4b8299a3bea607bebe6f0ef6c01fb1ebb29efa8690f0eda3569331ba
sesame-1.0-7.el5.x86_64.rpm     MD5: da0b723b0b0288078b835034888310b5
SHA-256: 5994a8b75ed7bc7b16fa9b4d9b48397bff9b980a65eb4b9cbe18c97771ad64f3
spqr-gen-0.3.6-3.el5.noarch.rpm     MD5: 472116e167eef2a68ac7e27486df1f3f
SHA-256: 8f39b96d65fc2b6080d3f38d1762cb5fb765ca9e0a088d5531c3c328a4028ad4
wallaby-0.16.3-1.el5.noarch.rpm     MD5: 3e85f8157b37edd1eb1e672da9a0f402
SHA-256: 7034fe1b5fd2c4e7b5f8d206cc4c3be1eadc52e12adeb38f2f363a0f457c1421
wallaby-utils-0.16.3-1.el5.noarch.rpm     MD5: 921ab27407d2c24ba8ccebaf91cd924f
SHA-256: 10216274337532d6bb566f796b249e923e03afed3ea1ac4331e5ed63a3b83eec
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

486480 - [RFE] Master should send obituary from .old logs if necessary
635207 - Cumin: Edit Dynamic Group Quota chart should allow editing subshares
703859 - Add chart(s) showing grid utilization by accounting group [RFE]
732388 - aviary query 'getSubmissionSummary' - match for owner
733498 - Expose suspend/continue controls for jobs through Aviary
733515 - lookup or discovery capability so that cumin can find Aviary endpoints
733516 - support for proposed Aviary endpoint lookup feature
739219 - Aviary does not handle job output filenames that do not contain explicit paths
740774 - Condor doesn't run jobs with real number in RequestMemory classad
746005 - [RFE] wallaby plumage feature
748053 - preemption does not work when group quotas are in effect
749569 - [RFE] the skeleton group support in ccp/s
750196 - Timer to dismiss invocation banners [RFE]
750818 - SELinux error (setattr) for VM/KVM universe jobs (RHEL5 only)
751013 - Job receive twice signal SIGCONT after condor_continue command.
752732 - list of OSes is out of frame
753822 - Make condor_job_server default submission publisher
755765 - RFE: Gracefully handle MAX_..._LOG configuration errors
756096 - [RFE]change UNHIBERNATE default value to not wake up all the machines
756384 - RFE: Add suspend/continue job operations
760567 - Change of DynamicQuota causes KeyError on empty data
766612 - condor_schedd.init - stop should return 0 if there is not service executable
768298 - Display supported browsers in cumin [RFE]
768319 - provide information of suspended jobs
768328 - there is no suspend and transfer states in ns0:JobStatusType
772587 - openmpiscript - A deprecated MCA parameter value 'plm_rsh_agent' (on RHEL 6.2)
773434 - Some condor_ commands with valid parameter '-help' return non zero exit code
782054 - VM without VNC console doesn't start
782132 - openmpiscript - Command mpirun needs parameter --prefix for correct run (on RHEL 6.2)
782359 - Condor HFS quota example returns "Unknown config:" from QMF
782552 - Use idempotent EC2 RunInstances
782553 - [RFE] Add support for EC2 Instance Resource Tagging
782816 - warning messages of wallaby shell
783139 - Remove job using aviary isn't handled properly
783267 - [RFE] ssh_to_job for VM/Java/Sched/Local universe
785283 - RFE: expose accounting group negotiation-ordering to configuration
785289 - RFE: Alter semantic of GROUP_AUTOREGROUP to replicate legacy behavior
786020 - condor_configure_pool + required parameters
786801 - Rotation of wallaby agent logs wrongly affects old logs
786815 - Time borders have no effect for list of resources, groups, users
786825 - plumage_stats parameter for server raise exception
787138 - Add time-stamp to yellow banner [RFE]
788452 - Java issue on updated packages from condor-7.6.3-0.3 to condor-7.6.5-0.11
789351 - Change cumin's charting tools to a non-flash-based solution [RFE]
796406 - wallaby doesn't recognize node config change when group deleted
796798 - [RFE] Make grid persona default for Cumin
799129 - [RFE] Add Kerberos authentication for Cumin
799382 - Grid - Quotas - CSV - 'loading' values
799404 - Grid - Limits - CSV - html metadata
800065 - Cumin processes sometimes do not exit and must be killed from master with SIGKILL
800079 - Provide API and implementation to query submissions using a page size and age
800660 - Updates for new Aviary locator support
801047 - [RFE] Change default value of sasl-mech-list to 'ANONYMOUS' or 'PLAIN DIGEST-MD5' with credentials
801287 - service cumin start missing pid file
801632 - [RFE] wallaby shell should have a means to delete a snapshot
802704 - Inventory - Filters for a value in a column in a table
802799 - wallaby shell replace-* commands with empty args should clear the value in the store
802821 - Support description metadata for features and snapshots in wallaby store
803359 - [RFE]change UNHIBERNATE default value to not wake up all the machines
803897 - RFE: advertise the accounting group that a running job matched under on the resource ad
805029 - Remove slotvis functionality from cumin [RFE]
805448 - bad submitter limit
805581 - Number of group quota exceeded
807398 - Endpoint updating for HA configurations
807820 - Update wallaby packaging to use wallaby assigned uid/gid
807838 - Use plumage data to provide initial reporting capabilities [RFE]
809006 - Double escaping html strings
809551 - [RFE] Add the ability to use keypair by name
809732 - PU job is runned before slots are cleaned from previous (removed) job
810982 - Enable locator support for QueryServer in RHHAv2 tools
813807 - Jobs submitted from cumin through aviary show 'unknown' for enqueued column
814386 - Integration of aviary for job control, submission, and job/submission queries [RFE]
815820 - condor_configd is using QMF_BROKER_AUTH_MECHANISM instead of QMF_BROKER_AUTH_MECH
820419 - RFE: new command show-node-config
828983 - condor resource agent start operation should have verification of startup
831709 - SharedPort should depend on Master
831725 - Cleanup ALLOW_NEGOTIATOR* params
831756 - Add ALLOW_NEGOTIATOR to the ExecuteNode feature
833095 - total local resources per slot for dynamic slots is always zero
833611 - The cluster-* commands always ask for a password even if only acting on the store
840076 - Job history collection daemon and tool
845567 - new PRE_SKIP key word in DAGMan
846955 - unexpected error message from condor init.d script
848344 - Problem submitting jobs from cumin via Aviary when commands have no arguments
850205 - traceback when bad option is provided to wallaby
850392 - RFE Update Hunting+Splitting+Defaults algorithm
850555 - RFE Add  new -expand option to condor_config_val
850567 - RFE Improved  the output of condor_userprio to better support hierarchical groups
850838 - RFE copy PRIORITY values from the DAG input file to the JobPrio attribute in the job ClassAd
851205 - schedulers list is bigger than its parent
851217 - wallaby shell should detect if there are more wallaby agents on broker
851222 - configd should detect if there are more wallaby agents on broker
855449 - getSubmissionID by qdate with scan mode "AFTER" does not work unless the qdate supplied is an exact match of an existing qdate
856646 - getSubmissionID() by qdate returning duplicates
860308 - condor SEGFAULT after upgrade while using custom hostname
860850 - CVE-2012-4462 condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets
862550 - schedd crash on local universe condor_suspend+condor_continue job
864091 - wallaby list-users prints READ_ONLY instead of READ
864637 - 'condor_restart -subsystem had' causes had and negotiator to shutdown
867989 - Cumin missing scheduler stats
871080 - Queryserver is not visible in locator
881366 - Wallaby shell modify-* commands do not accept empty strings as arguments
885787 - Wallaby agent exception while running in memory
886448 - Aviary api examples: option --timeout leads to Traceback


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/