Rapid7 Vulnerability & Exploit Database

RHSA-2010:0774: Red Hat Enterprise MRG Messaging and Grid Version 1.3

Back to Search

RHSA-2010:0774: Red Hat Enterprise MRG Messaging and Grid Version 1.3



Updated packages that fix two security issues, several bugs, and add multiple enhancements are now available as part of the ongoing support and maintenance of Red Hat Enterprise MRG Messaging and Grid for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a realtime IT infrastructure for enterprise computing. MRG Messaging uses Apache Qpid to implement the Advanced Message Queuing Protocol (AMQP) standard, adding persistence options, kernel optimizations, and operating system services. This update moves Red Hat Enterprise MRG to version 1.3. A flaw was found in the way Apache Qpid handled the receipt of invalid AMQP data. A remote user could send invalid AMQP data to the server, causing it to crash, resulting in the cluster shutting down. (CVE-2009-5005) A flaw was found in the way Apache Qpid handled a request to redeclare an existing exchange while adding a new alternate exchange. If a remote, authenticated user issued such a request, the server would crash, resulting in the cluster shutting down. (CVE-2009-5006) This update also adds the following enhancements: * This update introduces a protocol-independent C++ API. The extra layer of indirection will make it easy to support new versions of the AMQP protocol, as well as multiple versions simultaneously. (BZ#497747) * The management component is now capable of working in a cluster. (BZ#501015) * The Messaging Client Python API is now protocol-independent. (BZ#497748) * This update allows a JMS client to subscribe to the failover exchange to retrieve cluster membership information and subsequently to receive updates. (BZ#483753) * With this update, the qpidd service can be run without additional authentication options. (BZ#515513) * This update adds an OpenMPI wrapper script to Condor. It adds support for OpenMPI jobs. (BZ#537232) * The Messaging Client Python API now provides a failover mechanism for clustered brokers. (BZ#495718) * The Python Messaging API now includes support for Simple Authentication and Security Layer (SASL), which allows authentication support to be added to connection-based protocols. (BZ#548493) * The qpid-tool is now able to determine which session a queue consumer belongs to. (BZ#504325) * This update handles backward/forward compatibility for QMF and its components. (BZ#506698) * Both Secure Sockets Layer (SSL) and Remote Direct Memory Access (RDMA) entries can now appear in the list of known URLs. (BZ#471632) * This update allows for the scheduler daemon to run without swap. (BZ#548090) * This update introduces a mechanism that specifies the queue size of a queue that is setup via the Java API. (BZ#534008) * Previously, a collector could not be remotely restarted. With this update, the restart is possible and works as expected. (BZ#543021) * The usage information for the qpid-config utility (that is, the output of the "qpid-config -h" command) has been updated to include a brief explanation of the exchange type. (BZ#506420) These updated packages include many other bug fixes and enhancements. Users are directed to the Red Hat Enterprise MRG 1.3 Technical Notes for information on these changes: http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/1/html/Technical_Notes/index.html All Red Hat Enterprise MRG users are advised to upgrade to these updated packages, which resolve these issues and add these enhancements, as well as resolving the issues and adding the enhancements noted in the Red Hat Enterprise MRG 1.3 Technical Notes. After installing the updated packages, the qpidd service must be restarted ("service qpidd restart") for this update to take effect.


  • redhat-upgrade-classads
  • redhat-upgrade-classads-devel
  • redhat-upgrade-classads-static
  • redhat-upgrade-condor
  • redhat-upgrade-condor-job-hooks
  • redhat-upgrade-condor-kbdd
  • redhat-upgrade-condor-low-latency
  • redhat-upgrade-condor-qmf
  • redhat-upgrade-condor-wallaby-client
  • redhat-upgrade-mrg-grid-docs
  • redhat-upgrade-mrg-release
  • redhat-upgrade-python-condorutils
  • redhat-upgrade-python-qmf
  • redhat-upgrade-python-qpid
  • redhat-upgrade-qmf
  • redhat-upgrade-qmf-devel
  • redhat-upgrade-qpid-cpp-client
  • redhat-upgrade-qpid-cpp-client-devel
  • redhat-upgrade-qpid-cpp-client-devel-docs
  • redhat-upgrade-qpid-cpp-client-ssl
  • redhat-upgrade-qpid-cpp-server
  • redhat-upgrade-qpid-cpp-server-devel
  • redhat-upgrade-qpid-cpp-server-ssl
  • redhat-upgrade-qpid-cpp-server-store
  • redhat-upgrade-qpid-cpp-server-xml
  • redhat-upgrade-qpid-java-client
  • redhat-upgrade-qpid-java-common
  • redhat-upgrade-qpid-java-example
  • redhat-upgrade-qpid-tests
  • redhat-upgrade-qpid-tools
  • redhat-upgrade-rh-qpid-cpp-tests
  • redhat-upgrade-rhm-docs
  • redhat-upgrade-sesame

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center