Updated packages that provide several bug fixes are now available for Red HatEnterprise MRG 2.5 for Red Hat Enterprise Linux 5.

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation ITinfrastructure for enterprise computing. MRG offers increased performance,reliability, interoperability, and faster computing for enterprise customers.A race condition was discovered onqpid::management::ManagementAgent::debugSnapshot when one thread executedperiodic processing with traces enabled, while the second thread processed a QMFmethod from the client. The race condition caused a segfault. The fix improvesthread iteration behavior, which fixes the originally reported issue.(BZ#1219554) If a priority queue contained messages with differing priorities, rerouting thequeue contents to a non-priority destination queue caused the messages to beordered from lowest to highest, instead of highest to lowest. A fix to theMoveMessages::removeIf and PriorityQueue::removeIf changes the message traversalorder to highest-to-lowest, which ensures that any rerouted messages withpriority assigned are processed first in non-priority destination queues.(BZ#1223730)All users of Red Hat Enterprise MRG 2.5 for Red Hat Enterprise Linux 6 areadvised to upgrade to these updated packages, which correct these issues.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5)

SRPMS:
qpid-cpp-mrg-0.18-39.el5_10.src.rpm
    MD5: 4b0582d4772034a2b5fc6e43eed70d1eSHA-256: 2b9431fcf1b0ddba14dafa7ff5ff0857bd38f44e696a725f48fc793f89ea2959
 
IA-32:
qpid-cpp-client-0.18-39.el5_10.i386.rpm
    MD5: 61ef445a74669e30b2198cf1aa225131SHA-256: 23ea15a00c8a6b89017c1e7c66364fd6b4ba9287cb85b918b027abd0aeeca6f3
qpid-cpp-client-devel-0.18-39.el5_10.i386.rpm
    MD5: b6fa16e8157521877e4642df7973e2fcSHA-256: 355f94901cc7e7ef559b4adf16a8f13c08a6a6eee7c6d8e96cf67771ad59779c
qpid-cpp-client-devel-docs-0.18-39.el5_10.i386.rpm
    MD5: 40cb66b760ddaecefe7ba7474ed0cdb9SHA-256: 74ae2a4e0d0f54d88cbd4b024a9119d15001ce5adbb0011b63e8470cdc18361c
qpid-cpp-client-rdma-0.18-39.el5_10.i386.rpm
    MD5: 78cdf2632c6175ebd176943939b28148SHA-256: cc22b3438718efc391e1d298a276c331cc54e99cab27935d18a18f1ef1071195
qpid-cpp-client-ssl-0.18-39.el5_10.i386.rpm
    MD5: 6ed51384662af216f7246572678a0cb8SHA-256: b7277f5a73522162384bc7ac1f752d39975b10d927dd739d29effa6840c3040d
qpid-cpp-server-0.18-39.el5_10.i386.rpm
    MD5: 4c0b819efcd2a0a917afae5caeff20c4SHA-256: 8246869de51ca2664c6bf983cdf4076641c4dafa853f973b20fc4f55b7925025
qpid-cpp-server-cluster-0.18-39.el5_10.i386.rpm
    MD5: b69fa4e877029e9fc1030f3293afc4e2SHA-256: 4e0b74e73cdb2c7d58628e0f6d52fd78700ec28b8dc1c3e86858ab0f1ed39120
qpid-cpp-server-devel-0.18-39.el5_10.i386.rpm
    MD5: 8c912ec0be88797a588e3f05148b2fe7SHA-256: e4c75f489af6bd1b39cd27f848a78bba5d6a127228a4773dc2fb6a825966e0a6
qpid-cpp-server-rdma-0.18-39.el5_10.i386.rpm
    MD5: dccef89e4cbbb8370d3f15de76288725SHA-256: 9c7a0dcacfbf9fb0c38d57ff1f740ae668587ea9969052fe2c0cb8cdad578066
qpid-cpp-server-ssl-0.18-39.el5_10.i386.rpm
    MD5: d8c35915246ce7edfd7c5a12bbdb5d10SHA-256: ddcbe7059c2e5440b8b307c23210ae26c3b7996c0dfce1cd674633e5f18d4b3d
qpid-cpp-server-store-0.18-39.el5_10.i386.rpm
    MD5: 54ea4d7437bdb9046fdfb8c37a061addSHA-256: 5490d720627a00ece8a4e781689273ebe9c468650abdc7cbc6a623369b88ee11
qpid-cpp-server-xml-0.18-39.el5_10.i386.rpm
    MD5: 0d8d3ade717ee5739b7a522e4ad9bb91SHA-256: 79833a38a8fe1356f980c045e7a85b2fa6db27e33a2a5949af90d3a7d1d18fa3
 
x86_64:
qpid-cpp-client-0.18-39.el5_10.x86_64.rpm
    MD5: 6897ca326a17a27e32ccb5faf8ba5f90SHA-256: fe6ae67aab66e802c6747f6f369866e97e51403024e78fa0609390be6397b30f
qpid-cpp-client-devel-0.18-39.el5_10.x86_64.rpm
    MD5: f18a7dd772b35707a45d58f5aa5f085dSHA-256: b4d47c6d2784a10635b3d70147326a129b2c4e7e2d02d9f5c4d364ff84b5f721
qpid-cpp-client-devel-docs-0.18-39.el5_10.x86_64.rpm
    MD5: 0738d51b1683fbacdb03d65ab2fc6876SHA-256: 3bfc6e977926460091eb30ab54491d29b5d5527e660aa8bb770215dabafb4111
qpid-cpp-client-rdma-0.18-39.el5_10.x86_64.rpm
    MD5: 62cf4fb35fbca53bb8bcb12c110740d6SHA-256: eeccd99bc4755b177048bc55bc04bc1d56f15b11fe6da974f16021c3e42bbb64
qpid-cpp-client-ssl-0.18-39.el5_10.x86_64.rpm
    MD5: 11b146ef313aed2c4168c7a98b89fb94SHA-256: e4b72f09d6fc56e147ffe04b548c3719ad49d1d7ce57af0b4c46a64593760a73
qpid-cpp-server-0.18-39.el5_10.x86_64.rpm
    MD5: 1b204e7cce79aca06c6b6a66107ead1aSHA-256: f41626f30e9d3932203af503981b86bf52f7237211d831a71d78248f3b3474a4
qpid-cpp-server-cluster-0.18-39.el5_10.x86_64.rpm
    MD5: 8f7390cf4dc2077ed79b282bbe5bfa38SHA-256: 70fc045e3d17c931403f20627a84230f38b5730d0a009f256d7b2c4750caae3e
qpid-cpp-server-devel-0.18-39.el5_10.x86_64.rpm
    MD5: c2ac106f6f697cea9bea21094a1c1b3fSHA-256: a4d0b8b36c651ac49e84dd30e90cc758c7953aab66bf9aec6d9340d3bb1ba0f8
qpid-cpp-server-rdma-0.18-39.el5_10.x86_64.rpm
    MD5: 884f7ead1b8dd96924308b32c27daaeaSHA-256: d4c776ae99b02cab38236cff79c802850bc591408859155a25662780f6c0bc52
qpid-cpp-server-ssl-0.18-39.el5_10.x86_64.rpm
    MD5: e2f1484585778157829e53d8008547d5SHA-256: 6efa39690e31db62a5cfd99d324c4cf7ab6d6bf3b78ec16cf8a10bd7563d782b
qpid-cpp-server-store-0.18-39.el5_10.x86_64.rpm
    MD5: 4bbfefa616a07e4573a85aef7d75bf5aSHA-256: 3d5cd680c20d2093c9f4c4a13019dcbf58c5bd68c999bd496ae9a418a6cd5287
qpid-cpp-server-xml-0.18-39.el5_10.x86_64.rpm
    MD5: 63deb8649e50b76d5b286987375e50e3SHA-256: 7f3d9aa841d839fe119757741edc3910f08bae5ae3935b8b0779d070a0237a2e
 
(The unlinked packages above are only available from the Red Hat Network)
1236594 – MRG-M 2.5.17 RHEL-5 errata placeholder

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply