Updated Messaging component packages that fix multiple bugs are now availablefor Red Hat Enterprise MRG 2 for Red Hat Enterprise Linux 6.

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation ITinfrastructure for enterprise computing. MRG offers increased performance,reliability, interoperability, and faster computing for enterprise customers. MRG Messaging is a high-speed reliable messaging distribution for Linux based onAMQP (Advanced Message Queuing Protocol), an open protocol standard forenterprise messaging that is designed to make mission critical messaging widelyavailable as a standard service, and to make enterprise messaging interoperableacross platforms, programming languages, and vendors. MRG Messaging includes anAMQP 0-10 messaging broker; AMQP 0-10 client libraries for C++, Java JMS, andPython; as well as persistence libraries and management tools. This update fixes multiple bugs. Documentation for these changes will beavailable shortly from the Technical Notes document linked to in the Referencessection. All users of the Messaging capabilities of Red Hat Enterprise MRG 2 areadvised to upgrade to these updated packages, which resolve the issues noted inthe Red Hat Enterprise MRG 2 Technical Notes. After installing the updatedpackages, stop the cluster by either running “service qpidd stop” on all nodes,or “qpid-cluster –all-stop” on any one of the cluster nodes. Once stopped,restart the cluster with “service qpidd start” on all nodes for the update totake effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6)

SRPMS:
python-qpid-0.18-13.el6.src.rpm
    MD5: 8319c6bed1515cbefa281e2bfeec0540SHA-256: df7f1fc174e4fbf68434a95f26dbe51fd2f6d9ca8f18d530d73390e2d397871b
qpid-cpp-0.18-35.el6.src.rpm
    MD5: 6ec4ffe8adfd95bd1dcd259e5fd11bb3SHA-256: e0d9dda1905de6c6ad8e340fad77f7e9f569c4fbe7d737b243e402831e4fca03
qpid-qmf-0.18-28.el6.src.rpm
    MD5: d9110e78a7b4a428410c23db2cd306afSHA-256: ff8b605cd16cf8b2777366c0f297c95407866e36b9137087ffda17fbca69de99
 
IA-32:
python-qpid-0.18-13.el6.noarch.rpm
    MD5: 18a18dd669f3c44a552c5add5719c081SHA-256: 53ec3b1354ce3f9dcbb14be5288e77ce77ec1f3e8acaa182275193a56766dee2
python-qpid-qmf-0.18-28.el6.i686.rpm
    MD5: e43eba16284450651dec73567923d335SHA-256: fab338c55a79784b18de36f7fd1ca0dc085721b1df675bf4a2e1c276930f86c5
qpid-cpp-client-0.18-35.el6.i686.rpm
    MD5: 4bfa2e0f154fa372e62fd5f8639c57acSHA-256: b6633601b6672f5ec86eb059fec6fd216d34408287367a906971ec8896a3483c
qpid-cpp-client-devel-0.18-35.el6.i686.rpm
    MD5: 3f3041585312123cf163190f48a7b3fdSHA-256: 00e8683197c275baf5caf3dfc248501acb7c7b4b30aca36789a111e8dac30578
qpid-cpp-client-devel-docs-0.18-35.el6.noarch.rpm
    MD5: 4cf4e4b501b6db459beb361073a7e8f4SHA-256: e3838c149ebae5ea88fc1af8571d60fdd88dd9120b1d8842e67494874887f24f
qpid-cpp-client-rdma-0.18-35.el6.i686.rpm
    MD5: e9210bc4f7c46439af82aa800ffacce8SHA-256: 111b1c066fd35131b0bdddcd01c68d0b2e0dbcb5059bedeba3e7ed0a68fa27e3
qpid-cpp-client-ssl-0.18-35.el6.i686.rpm
    MD5: 29a35f008e7ff87c2e413290eb755b33SHA-256: aba1532fd0503d174b4c2e77154da18d3662ed6e3695b4d40f36a4e501193c45
qpid-cpp-debuginfo-0.18-35.el6.i686.rpm
    MD5: 0bde1509f7de39deed0f16121cff2707SHA-256: 3c5859ac7dba452a4b142bed8bd4f20c42a6b1384dfdbe8c5711e8a560ed3ac3
qpid-cpp-server-0.18-35.el6.i686.rpm
    MD5: 41d922a5d23ae299a4e6752eeb485546SHA-256: abdb319a1c735dc6f99974a22a78c1dd7051731a8eb11c8cb8175cf629e9a3d5
qpid-cpp-server-cluster-0.18-35.el6.i686.rpm
    MD5: 1b37b5b49eb80d4fb5e45addeac67fceSHA-256: 8aa4a784c5df88f023e36581525ee57d3f181d3e7026235b40dadea074d31f29
qpid-cpp-server-devel-0.18-35.el6.i686.rpm
    MD5: ab65886d858276f7513877520352f4d5SHA-256: f616fc652c7b0cee75f68db8e0bd71e28801508ffe1aec233dc5fdef398eb21d
qpid-cpp-server-rdma-0.18-35.el6.i686.rpm
    MD5: f343b69783d57ff2578c6a13aa9aece0SHA-256: 44c0b12da970a69cb40901e3ec6836f6f17730a21d5cf01b7707370d58716182
qpid-cpp-server-ssl-0.18-35.el6.i686.rpm
    MD5: 2f1a30fc7a39071c94683883e1e9a047SHA-256: ca6f24e606be3580faa4be4483f58d39ff2ece722f11ba67a538098cfd2bfc47
qpid-cpp-server-store-0.18-35.el6.i686.rpm
    MD5: ac283936d2d1fd15ee67edb2ce878af9SHA-256: 5209d91142734ec67e40e5b60a51289c2c8027dde877cf30f79cad611a3fdc27
qpid-cpp-server-xml-0.18-35.el6.i686.rpm
    MD5: f4cbd74c8e230b18f784852d2747544bSHA-256: 5e4a8d22f1c15d2b3ca4688968a21df101b0a6722bb8079242f001e4a1061657
qpid-qmf-0.18-28.el6.i686.rpm
    MD5: 00968695a4aa1263b627d187bc3070caSHA-256: ca89f8be792e12c3bcf9de75357efee18feff6dae3236baed277239eb56c9266
qpid-qmf-debuginfo-0.18-28.el6.i686.rpm
    MD5: 41001e69d7ce60a52bdcdb82dc579c99SHA-256: bdfff8a187ebb33fb825d45129336d281b522265b7a311bb317985ead34fdb92
qpid-qmf-devel-0.18-28.el6.i686.rpm
    MD5: 1e2c7e06833867780ac3ead179a8f2b9SHA-256: 79d30118692ad5d4477e69c617cf4e2909b0d5b8c19be1e33777cd810a3e35a3
ruby-qpid-qmf-0.18-28.el6.i686.rpm
    MD5: 36e2199fc7753522b4953e90cb1a6de6SHA-256: 643c78497e310fadb774d1247de47a7261be180c6b8d98c09e07db82cd14ba25
 
x86_64:
python-qpid-0.18-13.el6.noarch.rpm
    MD5: 18a18dd669f3c44a552c5add5719c081SHA-256: 53ec3b1354ce3f9dcbb14be5288e77ce77ec1f3e8acaa182275193a56766dee2
python-qpid-qmf-0.18-28.el6.x86_64.rpm
    MD5: 236f0db7f1ed9d9b9e35dc5c1e8b7650SHA-256: 14cbb798feea07190db08fffd8fafb1db003fe3533733ea0c269c98eacdcf60b
qpid-cpp-client-0.18-35.el6.i686.rpm
    MD5: 4bfa2e0f154fa372e62fd5f8639c57acSHA-256: b6633601b6672f5ec86eb059fec6fd216d34408287367a906971ec8896a3483c
qpid-cpp-client-0.18-35.el6.x86_64.rpm
    MD5: c1d0b5728a010915f356dd1038555967SHA-256: 327a889bd5ec58f1545af3cbda72f1e37fc1ec8cc5898354a716540b59074980
qpid-cpp-client-devel-0.18-35.el6.x86_64.rpm
    MD5: ee7fc3deeca7bee89132c2d1956e2fa6SHA-256: e186ce4bbe9159a8059689d3cbf32591e6713f674a0a04733f971b6e1c7529ef
qpid-cpp-client-devel-docs-0.18-35.el6.noarch.rpm
    MD5: 4cf4e4b501b6db459beb361073a7e8f4SHA-256: e3838c149ebae5ea88fc1af8571d60fdd88dd9120b1d8842e67494874887f24f
qpid-cpp-client-rdma-0.18-35.el6.x86_64.rpm
    MD5: 0c23f8966c8e5f03d6f74e513b8afe77SHA-256: 62482bd4c66019eda6f5ca72c7c50e46224dc5f3b0823c7ee7ba77a6b1f17805
qpid-cpp-client-ssl-0.18-35.el6.i686.rpm
    MD5: 29a35f008e7ff87c2e413290eb755b33SHA-256: aba1532fd0503d174b4c2e77154da18d3662ed6e3695b4d40f36a4e501193c45
qpid-cpp-client-ssl-0.18-35.el6.x86_64.rpm
    MD5: 650f34115a2ebe62317578efdad340deSHA-256: d8d0fcbad59b574c99b9265a7580d93bb35becfa9ffd915d87610e0fefec64c7
qpid-cpp-debuginfo-0.18-35.el6.i686.rpm
    MD5: 0bde1509f7de39deed0f16121cff2707SHA-256: 3c5859ac7dba452a4b142bed8bd4f20c42a6b1384dfdbe8c5711e8a560ed3ac3
qpid-cpp-debuginfo-0.18-35.el6.x86_64.rpm
    MD5: 2408d7affb864fb3addd85f9f18a05a0SHA-256: c44f4be2630f89c780c8f89badade3f48b1aa1af4b1370ebbaae45c5ee1c94ea
qpid-cpp-server-0.18-35.el6.i686.rpm
    MD5: 41d922a5d23ae299a4e6752eeb485546SHA-256: abdb319a1c735dc6f99974a22a78c1dd7051731a8eb11c8cb8175cf629e9a3d5
qpid-cpp-server-0.18-35.el6.x86_64.rpm
    MD5: b89a15065f3101a35b2ae03d9a7b11d2SHA-256: 563afb04534cbb89b25a4a836fefefec4022b717119757778833bfe9c0370185
qpid-cpp-server-cluster-0.18-35.el6.x86_64.rpm
    MD5: ed723c43c3277be5981560a63f263641SHA-256: ceaa1357246b3dbcb3e2a312b694f70d76de330bfed4dd0626d9a34a5d16b8c7
qpid-cpp-server-devel-0.18-35.el6.x86_64.rpm
    MD5: bb67ef2eab05636182dd62a2fdde3b3fSHA-256: e1f22de178367b443a88aaac81b42ae43c859a55c6d91909f3b63e03c8e21636
qpid-cpp-server-rdma-0.18-35.el6.x86_64.rpm
    MD5: e21e173c06687c40d2eea4522465114dSHA-256: ea7891257a65ed4f8b4d7019af7af025dcd5025cbda53c8ca92bf0545922bcfc
qpid-cpp-server-ssl-0.18-35.el6.x86_64.rpm
    MD5: e81b58822e65c36466309cdd188fd9aaSHA-256: 3f8f2b78d71ec596a2bafd318a6a33f1c1382302bd7ff46eab1fc5e4ec7e22ff
qpid-cpp-server-store-0.18-35.el6.x86_64.rpm
    MD5: 46f0b635baa5fbbb8ef60ee16c9ae940SHA-256: 391c79fa2bec5bcb025a6e43a9473888960e336bffa06dbcb54a251a402bf575
qpid-cpp-server-xml-0.18-35.el6.x86_64.rpm
    MD5: cf5890bf16df13e5d6a89b5ab25cc90bSHA-256: 689ddbf098b9b9554bcb3aee22fc12198215c588ff81482f068eebaa636726bb
qpid-qmf-0.18-28.el6.i686.rpm
    MD5: 00968695a4aa1263b627d187bc3070caSHA-256: ca89f8be792e12c3bcf9de75357efee18feff6dae3236baed277239eb56c9266
qpid-qmf-0.18-28.el6.x86_64.rpm
    MD5: 7eaa9392de0ccd41be4061f47a21fcd6SHA-256: f358bafeffbe7dedf5ca8b20814f0ca1b1ad60e7bdf3139aa8832c18d303deea
qpid-qmf-debuginfo-0.18-28.el6.i686.rpm
    MD5: 41001e69d7ce60a52bdcdb82dc579c99SHA-256: bdfff8a187ebb33fb825d45129336d281b522265b7a311bb317985ead34fdb92
qpid-qmf-debuginfo-0.18-28.el6.x86_64.rpm
    MD5: de19c45122cb61b143278b8bb694ca62SHA-256: 36f16db15f3171460a7da782e32beabe9735bebdee152bab92c8b1c6fae5d430
qpid-qmf-devel-0.18-28.el6.x86_64.rpm
    MD5: b6dc903517450dd322bbc7169aceca6aSHA-256: f7f3186d2273684479ba762626f865b1971f440376a7f17ea89f9b933a6922a7
ruby-qpid-qmf-0.18-28.el6.x86_64.rpm
    MD5: 807b035ecb871f9b1c4912222d37ef22SHA-256: cb658e2c814bac6c370150ea5caf8203625b99bb7c1b0a19067a33e2e71666a4
 
(The unlinked packages above are only available from the Red Hat Network)
1121615 – An attempt to enqueue&dequeue a message with “too high priority” to a ring queue causes broker segfault1128654 – nextReceiver() with IMMEDIATE duration always returns null1132395 – Memory leak when using federation with unreliable link1136294 – Memory leak when purging priority ring queue1142866 – Purging TTL expired messages 5times longer than before1147968 – Session.nextReceiver() with IMMEDIATE duration does not raise exception when connection is closed860691 – Poor performance when a priority queue with a ring queue policy has a large backlog

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply