Lucene search

K
redhatRedHatRHSA-2015:0708
HistoryMar 19, 2015 - 4:56 p.m.

(RHSA-2015:0708) Moderate: qpid security and bug fix update

2015-03-1916:56:30
access.redhat.com
10

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.962 High

EPSS

Percentile

99.2%

Red Hat Enterprise MRG is a next-generation IT infrastructure incorporating
Messaging, Real Time, and Grid functionality. It offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.

MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors.

MRG Messaging includes AMQP messaging broker; AMQP client libraries for
C++, Java JMS, and Python; as well as persistence libraries and
management tools.

It was discovered that the Qpid daemon (qpidd) did not restrict access to
anonymous users when the ANONYMOUS mechanism was disallowed.
(CVE-2015-0223)

A flaw was found in the way the Qpid daemon (qpidd) processed certain
protocol sequences. An unauthenticated attacker able to send a specially
crafted protocol sequence set that could use this flaw to crash qpidd.
(CVE-2015-0203, CVE-2015-0224)

Red Hat would like to thank the Apache Software Foundation for reporting
the CVE-2015-0203 issue. Upstream acknowledges G. Geshev from MWR Labs as
the original reporter.

This update also fixes the following bugs:

  • Previously, the neutron messaging client rewrote (by method of
    “monkey-patching”) the python selector module to support eventlet
    threading. The rewritten client did not update select.poll() during this
    process, which is used by qpid-python to manage I/O. This resulted in
    poll() deadlocks and neutron server hangs. The fix introduces updates to
    the python-qpid library that avoid calling poll() if eventlet threading is
    detected. Instead, the eventlet-aware select() is called, which prevents
    deadlocks from occurring and corrects the originally reported issue.
    (BZ#1175872)

  • It was discovered that the QPID Broker aborted with an uncaught
    UnknownExchangeTypeException when the client attempted to request an
    unsupported exchange type. The code for the Exchange Registry and Node
    Policy has been improved to prevent this issue from happening again.
    (BZ#1186694)

Users of the Messaging capabilities of Red Hat Enterprise MRG 3, which is
layered on Red Hat Enterprise Linux 7, are advised to upgrade to these
updated packages, which correct these issues.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.962 High

EPSS

Percentile

99.2%