Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-1909
Vulnerability from cvelistv5
Published
2013-08-23 16:00
Modified
2024-09-16 17:42
Severity ?
EPSS score ?
Summary
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "53968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53968" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/QPID-4918" }, { "name": "RHSA-2013:1024", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1024.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" }, { "name": "54137", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54137" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-23T16:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "53968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53968" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/QPID-4918" }, { "name": "RHSA-2013:1024", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1024.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" }, { "name": "54137", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54137" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1909", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "53968", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53968" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013" }, { "name": "https://issues.apache.org/jira/browse/QPID-4918", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/QPID-4918" }, { "name": "RHSA-2013:1024", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1024.html" }, { "name": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html", "refsource": "CONFIRM", "url": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" }, { "name": "54137", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54137" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1909", "datePublished": "2013-08-23T16:00:00Z", "dateReserved": "2013-02-19T00:00:00Z", "dateUpdated": "2024-09-16T17:42:38.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C60FA8B1-1802-4522-A088-22171DCF7A93\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.20\", \"matchCriteriaId\": \"2EFF35CD-0D3D-4B29-8E7A-9C39D7358A3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71A147B7-2E6B-4E7A-8C68-BEDFCACD57AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"760A5796-9BB5-45A3-AB0E-D3639D487A76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D441FDC2-CA4E-43C5-A3DD-3715641E59A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79CB1E30-BDD9-451E-A366-EE19C2E00AF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8690F211-CE64-4799-87C5-F2AEDB0500EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469FC441-523B-4C78-9B2D-46B8CCE8811E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB64A222-C258-44BF-A83D-CFE1204F8009\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C584B299-0BB9-4B4F-B0BC-11DE222F1F17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D74323FF-612A-48EE-A03E-D49CAD828101\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21261207-0DF5-460A-9F9B-F8CADB78DAF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5A6F2E8-325C-4071-9862-8242B730B147\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"578FB3FD-EA55-4A39-94D4-F4194C0F2BB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C67B5857-3CD8-445A-B60D-C0285BB60A07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2949A7DC-2955-4770-94CE-5AB9EEC3B1DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:qpid:0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B227D078-8298-4594-8F96-F2976F189B6A\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.\"}, {\"lang\": \"es\", \"value\": \"El cliente Python en Apache Qpid anterior a v2.2 no verifica que el nombre del servidor coincide con un nombre de dominio en el nombre com\\u00fan del sujeto (CN) o el campo subjectAltName del certificado X.509, permitiendo a los atacantes de hombre-en-medio (man-in-the-middle) falsificar servidores SSL mediante un certificado v\\u00e1lido de su elecci\\u00f3n.\"}]", "id": "CVE-2013-1909", "lastModified": "2024-11-21T01:50:38.163", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2013-08-23T16:55:07.063", "references": "[{\"url\": \"http://qpid.apache.org/releases/qpid-0.22/release-notes.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1024.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/53968\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/54137\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://svn.apache.org/viewvc?view=revision\u0026revision=1460013\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://issues.apache.org/jira/browse/QPID-4918\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://qpid.apache.org/releases/qpid-0.22/release-notes.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1024.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/53968\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/54137\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://svn.apache.org/viewvc?view=revision\u0026revision=1460013\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://issues.apache.org/jira/browse/QPID-4918\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2013-1909\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-08-23T16:55:07.063\",\"lastModified\":\"2024-11-21T01:50:38.163\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.\"},{\"lang\":\"es\",\"value\":\"El cliente Python en Apache Qpid anterior a v2.2 no verifica que el nombre del servidor coincide con un nombre de dominio en el nombre com\u00fan del sujeto (CN) o el campo subjectAltName del certificado X.509, permitiendo a los atacantes de hombre-en-medio (man-in-the-middle) falsificar servidores SSL mediante un certificado v\u00e1lido de su elecci\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C60FA8B1-1802-4522-A088-22171DCF7A93\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.20\",\"matchCriteriaId\":\"2EFF35CD-0D3D-4B29-8E7A-9C39D7358A3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A147B7-2E6B-4E7A-8C68-BEDFCACD57AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760A5796-9BB5-45A3-AB0E-D3639D487A76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D441FDC2-CA4E-43C5-A3DD-3715641E59A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79CB1E30-BDD9-451E-A366-EE19C2E00AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8690F211-CE64-4799-87C5-F2AEDB0500EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469FC441-523B-4C78-9B2D-46B8CCE8811E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB64A222-C258-44BF-A83D-CFE1204F8009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C584B299-0BB9-4B4F-B0BC-11DE222F1F17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D74323FF-612A-48EE-A03E-D49CAD828101\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21261207-0DF5-460A-9F9B-F8CADB78DAF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A6F2E8-325C-4071-9862-8242B730B147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"578FB3FD-EA55-4A39-94D4-F4194C0F2BB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C67B5857-3CD8-445A-B60D-C0285BB60A07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2949A7DC-2955-4770-94CE-5AB9EEC3B1DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B227D078-8298-4594-8F96-F2976F189B6A\"}]}]}],\"references\":[{\"url\":\"http://qpid.apache.org/releases/qpid-0.22/release-notes.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1024.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/53968\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54137\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1460013\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://issues.apache.org/jira/browse/QPID-4918\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://qpid.apache.org/releases/qpid-0.22/release-notes.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/53968\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54137\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1460013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://issues.apache.org/jira/browse/QPID-4918\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}" } }
ghsa-3g2p-7c6p-vj8c
Vulnerability from github
Published
2022-05-13 01:08
Modified
2024-10-25 21:06
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Summary
Apache Qpid Python client Improper certificate validation
Details
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "qpid-python" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.22" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2013-1909" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": true, "github_reviewed_at": "2024-04-29T11:05:29Z", "nvd_published_at": "2013-08-23T16:55:00Z", "severity": "HIGH" }, "details": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.", "id": "GHSA-3g2p-7c6p-vj8c", "modified": "2024-10-25T21:06:37Z", "published": "2022-05-13T01:08:41Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1909" }, { "type": "WEB", "url": "https://github.com/apache/qpid-python/commit/7d8f51791c4949404d78f1083f465b7b4c8e954b" }, { "type": "PACKAGE", "url": "https://github.com/apache/qpid-python" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/qpid-python/PYSEC-2013-25.yaml" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/QPID-4918" }, { "type": "WEB", "url": "https://web.archive.org/web/20140722191407/http://secunia.com/advisories/53968" }, { "type": "WEB", "url": "https://web.archive.org/web/20140722194233/http://secunia.com/advisories/54137" }, { "type": "WEB", "url": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1024.html" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Apache Qpid Python client Improper certificate validation" }
CVE-2013-1909
Vulnerability from fkie_nvd
Published
2013-08-23 16:55
Modified
2024-11-21 01:50
Severity ?
Summary
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | enterprise_mrg | 2.0 | |
apache | qpid | * | |
apache | qpid | 0.5 | |
apache | qpid | 0.6 | |
apache | qpid | 0.7 | |
apache | qpid | 0.8 | |
apache | qpid | 0.9 | |
apache | qpid | 0.10 | |
apache | qpid | 0.11 | |
apache | qpid | 0.12 | |
apache | qpid | 0.13 | |
apache | qpid | 0.14 | |
apache | qpid | 0.15 | |
apache | qpid | 0.16 | |
apache | qpid | 0.17 | |
apache | qpid | 0.18 | |
apache | qpid | 0.19 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C60FA8B1-1802-4522-A088-22171DCF7A93", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EFF35CD-0D3D-4B29-8E7A-9C39D7358A3A", "versionEndIncluding": "0.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "71A147B7-2E6B-4E7A-8C68-BEDFCACD57AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "760A5796-9BB5-45A3-AB0E-D3639D487A76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D441FDC2-CA4E-43C5-A3DD-3715641E59A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "79CB1E30-BDD9-451E-A366-EE19C2E00AF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8690F211-CE64-4799-87C5-F2AEDB0500EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "469FC441-523B-4C78-9B2D-46B8CCE8811E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*", "matchCriteriaId": "BB64A222-C258-44BF-A83D-CFE1204F8009", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*", "matchCriteriaId": "C584B299-0BB9-4B4F-B0BC-11DE222F1F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*", "matchCriteriaId": "D74323FF-612A-48EE-A03E-D49CAD828101", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*", "matchCriteriaId": "21261207-0DF5-460A-9F9B-F8CADB78DAF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "F5A6F2E8-325C-4071-9862-8242B730B147", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "578FB3FD-EA55-4A39-94D4-F4194C0F2BB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*", "matchCriteriaId": "C67B5857-3CD8-445A-B60D-C0285BB60A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.18:*:*:*:*:*:*:*", "matchCriteriaId": "2949A7DC-2955-4770-94CE-5AB9EEC3B1DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:qpid:0.19:*:*:*:*:*:*:*", "matchCriteriaId": "B227D078-8298-4594-8F96-F2976F189B6A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." }, { "lang": "es", "value": "El cliente Python en Apache Qpid anterior a v2.2 no verifica que el nombre del servidor coincide con un nombre de dominio en el nombre com\u00fan del sujeto (CN) o el campo subjectAltName del certificado X.509, permitiendo a los atacantes de hombre-en-medio (man-in-the-middle) falsificar servidores SSL mediante un certificado v\u00e1lido de su elecci\u00f3n." } ], "id": "CVE-2013-1909", "lastModified": "2024-11-21T01:50:38.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-08-23T16:55:07.063", "references": [ { "source": "secalert@redhat.com", "url": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-1024.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53968" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54137" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://issues.apache.org/jira/browse/QPID-4918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://issues.apache.org/jira/browse/QPID-4918" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2013:1024
Vulnerability from csaf_redhat
Published
2013-07-11 13:21
Modified
2024-11-22 06:37
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update
Notes
Topic
Updated Messaging component packages that fix one security issue and
multiple bugs are now available for Red Hat Enterprise MRG 2.3 for Red Hat
Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.
It was discovered that the Qpid Python client library for AMQP did not
properly perform TLS/SSL certificate validation of the remote server's
certificate, even when the 'ssl_trustfile' connection option was specified.
A rogue server could use this flaw to conduct man-in-the-middle attacks,
possibly leading to the disclosure of sensitive information.
(CVE-2013-1909)
With this update, Python programs can instruct the library to validate
server certificates by specifying a path to a file containing trusted CA
certificates.
This issue was discovered by Petr Matousek of the Red Hat MRG Messaging
team.
This update also fixes multiple bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.
All users of the Messaging capabilities of Red Hat Enterprise MRG 2.3 are
advised to upgrade to these updated packages, which resolve the issues
noted in the Red Hat Enterprise MRG 2 Technical Notes. After installing the
updated packages, stop the cluster by either running "service qpidd stop"
on all nodes, or "qpid-cluster --all-stop" on any one of the cluster nodes.
Once stopped, restart the cluster with "service qpidd start" on all nodes
for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Messaging component packages that fix one security issue and\nmultiple bugs are now available for Red Hat Enterprise MRG 2.3 for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Messaging is a high-speed reliable messaging distribution for Linux\nbased on AMQP (Advanced Message Queuing Protocol), an open protocol\nstandard for enterprise messaging that is designed to make mission critical\nmessaging widely available as a standard service, and to make enterprise\nmessaging interoperable across platforms, programming languages, and\nvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10\nclient libraries for C++, Java JMS, and Python; as well as persistence\nlibraries and management tools.\n\nIt was discovered that the Qpid Python client library for AMQP did not\nproperly perform TLS/SSL certificate validation of the remote server\u0027s\ncertificate, even when the \u0027ssl_trustfile\u0027 connection option was specified.\nA rogue server could use this flaw to conduct man-in-the-middle attacks,\npossibly leading to the disclosure of sensitive information.\n(CVE-2013-1909)\n\nWith this update, Python programs can instruct the library to validate\nserver certificates by specifying a path to a file containing trusted CA\ncertificates.\n\nThis issue was discovered by Petr Matousek of the Red Hat MRG Messaging\nteam.\n\nThis update also fixes multiple bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nAll users of the Messaging capabilities of Red Hat Enterprise MRG 2.3 are\nadvised to upgrade to these updated packages, which resolve the issues\nnoted in the Red Hat Enterprise MRG 2 Technical Notes. After installing the\nupdated packages, stop the cluster by either running \"service qpidd stop\"\non all nodes, or \"qpid-cluster --all-stop\" on any one of the cluster nodes.\nOnce stopped, restart the cluster with \"service qpidd start\" on all nodes\nfor the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1024", "url": "https://access.redhat.com/errata/RHSA-2013:1024" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html" }, { "category": "external", "summary": "928530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928530" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1024.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update", "tracking": { "current_release_date": "2024-11-22T06:37:49+00:00", "generator": { "date": "2024-11-22T06:37:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1024", "initial_release_date": "2013-07-11T13:21:00+00:00", "revision_history": [ { "date": "2013-07-11T13:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-07-11T13:23:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:37:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product": { "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:computenode:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "python-qpid-0:0.18-5.el6_4.noarch", "product": { "name": "python-qpid-0:0.18-5.el6_4.noarch", "product_id": "python-qpid-0:0.18-5.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.18-5.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-client-0:0.18-8.el6_4.noarch", "product": { "name": "qpid-java-client-0:0.18-8.el6_4.noarch", "product_id": "qpid-java-client-0:0.18-8.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-client@0.18-8.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-common-0:0.18-8.el6_4.noarch", "product": { "name": "qpid-java-common-0:0.18-8.el6_4.noarch", "product_id": "qpid-java-common-0:0.18-8.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-common@0.18-8.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-example-0:0.18-8.el6_4.noarch", "product": { "name": "qpid-java-example-0:0.18-8.el6_4.noarch", "product_id": "qpid-java-example-0:0.18-8.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-example@0.18-8.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-tools-0:0.18-10.el6_4.noarch", "product": { "name": "qpid-tools-0:0.18-10.el6_4.noarch", "product_id": "qpid-tools-0:0.18-10.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.18-10.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "product": { "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "product_id": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.18-17.el6_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-qpid-0:0.18-5.el6_4.src", "product": { "name": "python-qpid-0:0.18-5.el6_4.src", "product_id": "python-qpid-0:0.18-5.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.18-5.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-java-0:0.18-8.el6_4.src", "product": { "name": "qpid-java-0:0.18-8.el6_4.src", "product_id": "qpid-java-0:0.18-8.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java@0.18-8.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-tools-0:0.18-10.el6_4.src", "product": { "name": "qpid-tools-0:0.18-10.el6_4.src", "product_id": "qpid-tools-0:0.18-10.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.18-10.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-cpp-0:0.18-17.el6_4.src", "product": { "name": "qpid-cpp-0:0.18-17.el6_4.src", "product_id": "qpid-cpp-0:0.18-17.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp@0.18-17.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.18-18.el6_4.src", "product": { "name": "qpid-qmf-0:0.18-18.el6_4.src", "product_id": "qpid-qmf-0:0.18-18.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.18-18.el6_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "product": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_id": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "product": { "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_id": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "product": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "product_id": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.18-18.el6_4.x86_64", "product": { "name": "qpid-qmf-0:0.18-18.el6_4.x86_64", "product_id": "qpid-qmf-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "product": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "product_id": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.18-18.el6_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "product": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "product_id": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.18-18.el6_4.i686", "product": { "name": "qpid-qmf-0:0.18-18.el6_4.i686", "product_id": "qpid-qmf-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "product": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "product_id": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "product": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "product_id": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.18-18.el6_4.i686", "product": { "name": "python-qpid-qmf-0:0.18-18.el6_4.i686", "product_id": "python-qpid-qmf-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.18-18.el6_4?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.noarch as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch" }, "product_reference": "python-qpid-0:0.18-5.el6_4.noarch", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src" }, "product_reference": "python-qpid-0:0.18-5.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-0:0.18-17.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src" }, "product_reference": "qpid-cpp-0:0.18-17.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.noarch as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.noarch", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch" }, "product_reference": "python-qpid-0:0.18-5.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src" }, "product_reference": "python-qpid-0:0.18-5.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-0:0.18-17.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src" }, "product_reference": "qpid-cpp-0:0.18-17.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-0:0.18-8.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src" }, "product_reference": "qpid-java-0:0.18-8.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-client-0:0.18-8.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch" }, "product_reference": "qpid-java-client-0:0.18-8.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-common-0:0.18-8.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch" }, "product_reference": "qpid-java-common-0:0.18-8.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-example-0:0.18-8.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch" }, "product_reference": "qpid-java-example-0:0.18-8.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Petr Matousek" ], "organization": "Red Hat MRG Messaging team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-1909", "discovery_date": "2013-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "928530" } ], "notes": [ { "category": "description", "text": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-qpid: client does not validate qpid server TLS/SSL certificate", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1909" }, { "category": "external", "summary": "RHBZ#928530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928530" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1909", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1909" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1909", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1909" }, { "category": "external", "summary": "http://qpid.apache.org/release_notes_0.22.html", "url": "http://qpid.apache.org/release_notes_0.22.html" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/QPID-4918", "url": "https://issues.apache.org/jira/browse/QPID-4918" } ], "release_date": "2013-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-11T13:21:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1024" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-qpid: client does not validate qpid server TLS/SSL certificate" } ] }
rhsa-2013_1024
Vulnerability from csaf_redhat
Published
2013-07-11 13:21
Modified
2024-11-22 06:37
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update
Notes
Topic
Updated Messaging component packages that fix one security issue and
multiple bugs are now available for Red Hat Enterprise MRG 2.3 for Red Hat
Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.
It was discovered that the Qpid Python client library for AMQP did not
properly perform TLS/SSL certificate validation of the remote server's
certificate, even when the 'ssl_trustfile' connection option was specified.
A rogue server could use this flaw to conduct man-in-the-middle attacks,
possibly leading to the disclosure of sensitive information.
(CVE-2013-1909)
With this update, Python programs can instruct the library to validate
server certificates by specifying a path to a file containing trusted CA
certificates.
This issue was discovered by Petr Matousek of the Red Hat MRG Messaging
team.
This update also fixes multiple bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.
All users of the Messaging capabilities of Red Hat Enterprise MRG 2.3 are
advised to upgrade to these updated packages, which resolve the issues
noted in the Red Hat Enterprise MRG 2 Technical Notes. After installing the
updated packages, stop the cluster by either running "service qpidd stop"
on all nodes, or "qpid-cluster --all-stop" on any one of the cluster nodes.
Once stopped, restart the cluster with "service qpidd start" on all nodes
for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Messaging component packages that fix one security issue and\nmultiple bugs are now available for Red Hat Enterprise MRG 2.3 for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Messaging is a high-speed reliable messaging distribution for Linux\nbased on AMQP (Advanced Message Queuing Protocol), an open protocol\nstandard for enterprise messaging that is designed to make mission critical\nmessaging widely available as a standard service, and to make enterprise\nmessaging interoperable across platforms, programming languages, and\nvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10\nclient libraries for C++, Java JMS, and Python; as well as persistence\nlibraries and management tools.\n\nIt was discovered that the Qpid Python client library for AMQP did not\nproperly perform TLS/SSL certificate validation of the remote server\u0027s\ncertificate, even when the \u0027ssl_trustfile\u0027 connection option was specified.\nA rogue server could use this flaw to conduct man-in-the-middle attacks,\npossibly leading to the disclosure of sensitive information.\n(CVE-2013-1909)\n\nWith this update, Python programs can instruct the library to validate\nserver certificates by specifying a path to a file containing trusted CA\ncertificates.\n\nThis issue was discovered by Petr Matousek of the Red Hat MRG Messaging\nteam.\n\nThis update also fixes multiple bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nAll users of the Messaging capabilities of Red Hat Enterprise MRG 2.3 are\nadvised to upgrade to these updated packages, which resolve the issues\nnoted in the Red Hat Enterprise MRG 2 Technical Notes. After installing the\nupdated packages, stop the cluster by either running \"service qpidd stop\"\non all nodes, or \"qpid-cluster --all-stop\" on any one of the cluster nodes.\nOnce stopped, restart the cluster with \"service qpidd start\" on all nodes\nfor the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1024", "url": "https://access.redhat.com/errata/RHSA-2013:1024" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html" }, { "category": "external", "summary": "928530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928530" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1024.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update", "tracking": { "current_release_date": "2024-11-22T06:37:49+00:00", "generator": { "date": "2024-11-22T06:37:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1024", "initial_release_date": "2013-07-11T13:21:00+00:00", "revision_history": [ { "date": "2013-07-11T13:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-07-11T13:23:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:37:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product": { "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:computenode:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "python-qpid-0:0.18-5.el6_4.noarch", "product": { "name": "python-qpid-0:0.18-5.el6_4.noarch", "product_id": "python-qpid-0:0.18-5.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.18-5.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-client-0:0.18-8.el6_4.noarch", "product": { "name": "qpid-java-client-0:0.18-8.el6_4.noarch", "product_id": "qpid-java-client-0:0.18-8.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-client@0.18-8.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-common-0:0.18-8.el6_4.noarch", "product": { "name": "qpid-java-common-0:0.18-8.el6_4.noarch", "product_id": "qpid-java-common-0:0.18-8.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-common@0.18-8.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-example-0:0.18-8.el6_4.noarch", "product": { "name": "qpid-java-example-0:0.18-8.el6_4.noarch", "product_id": "qpid-java-example-0:0.18-8.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-example@0.18-8.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-tools-0:0.18-10.el6_4.noarch", "product": { "name": "qpid-tools-0:0.18-10.el6_4.noarch", "product_id": "qpid-tools-0:0.18-10.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.18-10.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "product": { "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "product_id": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.18-17.el6_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-qpid-0:0.18-5.el6_4.src", "product": { "name": "python-qpid-0:0.18-5.el6_4.src", "product_id": "python-qpid-0:0.18-5.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.18-5.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-java-0:0.18-8.el6_4.src", "product": { "name": "qpid-java-0:0.18-8.el6_4.src", "product_id": "qpid-java-0:0.18-8.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java@0.18-8.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-tools-0:0.18-10.el6_4.src", "product": { "name": "qpid-tools-0:0.18-10.el6_4.src", "product_id": "qpid-tools-0:0.18-10.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.18-10.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-cpp-0:0.18-17.el6_4.src", "product": { "name": "qpid-cpp-0:0.18-17.el6_4.src", "product_id": "qpid-cpp-0:0.18-17.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp@0.18-17.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.18-18.el6_4.src", "product": { "name": "qpid-qmf-0:0.18-18.el6_4.src", "product_id": "qpid-qmf-0:0.18-18.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.18-18.el6_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "product": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_id": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "product": { "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_id": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "product": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "product_id": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.18-18.el6_4.x86_64", "product": { "name": "qpid-qmf-0:0.18-18.el6_4.x86_64", "product_id": "qpid-qmf-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "product": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "product_id": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.18-18.el6_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "product": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "product_id": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.18-18.el6_4.i686", "product": { "name": "qpid-qmf-0:0.18-18.el6_4.i686", "product_id": "qpid-qmf-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "product": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "product_id": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "product": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "product_id": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.18-18.el6_4.i686", "product": { "name": "python-qpid-qmf-0:0.18-18.el6_4.i686", "product_id": "python-qpid-qmf-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.18-18.el6_4?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.noarch as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch" }, "product_reference": "python-qpid-0:0.18-5.el6_4.noarch", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src" }, "product_reference": "python-qpid-0:0.18-5.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-0:0.18-17.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src" }, "product_reference": "qpid-cpp-0:0.18-17.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.noarch as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.noarch", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch" }, "product_reference": "python-qpid-0:0.18-5.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src" }, "product_reference": "python-qpid-0:0.18-5.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-0:0.18-17.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src" }, "product_reference": "qpid-cpp-0:0.18-17.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-0:0.18-8.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src" }, "product_reference": "qpid-java-0:0.18-8.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-client-0:0.18-8.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch" }, "product_reference": "qpid-java-client-0:0.18-8.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-common-0:0.18-8.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch" }, "product_reference": "qpid-java-common-0:0.18-8.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-example-0:0.18-8.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch" }, "product_reference": "qpid-java-example-0:0.18-8.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Petr Matousek" ], "organization": "Red Hat MRG Messaging team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-1909", "discovery_date": "2013-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "928530" } ], "notes": [ { "category": "description", "text": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-qpid: client does not validate qpid server TLS/SSL certificate", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1909" }, { "category": "external", "summary": "RHBZ#928530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928530" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1909", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1909" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1909", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1909" }, { "category": "external", "summary": "http://qpid.apache.org/release_notes_0.22.html", "url": "http://qpid.apache.org/release_notes_0.22.html" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/QPID-4918", "url": "https://issues.apache.org/jira/browse/QPID-4918" } ], "release_date": "2013-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-11T13:21:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1024" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-qpid: client does not validate qpid server TLS/SSL certificate" } ] }
RHSA-2013:1024
Vulnerability from csaf_redhat
Published
2013-07-11 13:21
Modified
2024-11-22 06:37
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update
Notes
Topic
Updated Messaging component packages that fix one security issue and
multiple bugs are now available for Red Hat Enterprise MRG 2.3 for Red Hat
Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.
It was discovered that the Qpid Python client library for AMQP did not
properly perform TLS/SSL certificate validation of the remote server's
certificate, even when the 'ssl_trustfile' connection option was specified.
A rogue server could use this flaw to conduct man-in-the-middle attacks,
possibly leading to the disclosure of sensitive information.
(CVE-2013-1909)
With this update, Python programs can instruct the library to validate
server certificates by specifying a path to a file containing trusted CA
certificates.
This issue was discovered by Petr Matousek of the Red Hat MRG Messaging
team.
This update also fixes multiple bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.
All users of the Messaging capabilities of Red Hat Enterprise MRG 2.3 are
advised to upgrade to these updated packages, which resolve the issues
noted in the Red Hat Enterprise MRG 2 Technical Notes. After installing the
updated packages, stop the cluster by either running "service qpidd stop"
on all nodes, or "qpid-cluster --all-stop" on any one of the cluster nodes.
Once stopped, restart the cluster with "service qpidd start" on all nodes
for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Messaging component packages that fix one security issue and\nmultiple bugs are now available for Red Hat Enterprise MRG 2.3 for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Messaging is a high-speed reliable messaging distribution for Linux\nbased on AMQP (Advanced Message Queuing Protocol), an open protocol\nstandard for enterprise messaging that is designed to make mission critical\nmessaging widely available as a standard service, and to make enterprise\nmessaging interoperable across platforms, programming languages, and\nvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10\nclient libraries for C++, Java JMS, and Python; as well as persistence\nlibraries and management tools.\n\nIt was discovered that the Qpid Python client library for AMQP did not\nproperly perform TLS/SSL certificate validation of the remote server\u0027s\ncertificate, even when the \u0027ssl_trustfile\u0027 connection option was specified.\nA rogue server could use this flaw to conduct man-in-the-middle attacks,\npossibly leading to the disclosure of sensitive information.\n(CVE-2013-1909)\n\nWith this update, Python programs can instruct the library to validate\nserver certificates by specifying a path to a file containing trusted CA\ncertificates.\n\nThis issue was discovered by Petr Matousek of the Red Hat MRG Messaging\nteam.\n\nThis update also fixes multiple bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nAll users of the Messaging capabilities of Red Hat Enterprise MRG 2.3 are\nadvised to upgrade to these updated packages, which resolve the issues\nnoted in the Red Hat Enterprise MRG 2 Technical Notes. After installing the\nupdated packages, stop the cluster by either running \"service qpidd stop\"\non all nodes, or \"qpid-cluster --all-stop\" on any one of the cluster nodes.\nOnce stopped, restart the cluster with \"service qpidd start\" on all nodes\nfor the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1024", "url": "https://access.redhat.com/errata/RHSA-2013:1024" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html" }, { "category": "external", "summary": "928530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928530" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1024.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update", "tracking": { "current_release_date": "2024-11-22T06:37:49+00:00", "generator": { "date": "2024-11-22T06:37:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1024", "initial_release_date": "2013-07-11T13:21:00+00:00", "revision_history": [ { "date": "2013-07-11T13:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-07-11T13:23:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:37:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product": { "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:computenode:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "python-qpid-0:0.18-5.el6_4.noarch", "product": { "name": "python-qpid-0:0.18-5.el6_4.noarch", "product_id": "python-qpid-0:0.18-5.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.18-5.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-client-0:0.18-8.el6_4.noarch", "product": { "name": "qpid-java-client-0:0.18-8.el6_4.noarch", "product_id": "qpid-java-client-0:0.18-8.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-client@0.18-8.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-common-0:0.18-8.el6_4.noarch", "product": { "name": "qpid-java-common-0:0.18-8.el6_4.noarch", "product_id": "qpid-java-common-0:0.18-8.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-common@0.18-8.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-example-0:0.18-8.el6_4.noarch", "product": { "name": "qpid-java-example-0:0.18-8.el6_4.noarch", "product_id": "qpid-java-example-0:0.18-8.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-example@0.18-8.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-tools-0:0.18-10.el6_4.noarch", "product": { "name": "qpid-tools-0:0.18-10.el6_4.noarch", "product_id": "qpid-tools-0:0.18-10.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.18-10.el6_4?arch=noarch" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "product": { "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "product_id": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.18-17.el6_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-qpid-0:0.18-5.el6_4.src", "product": { "name": "python-qpid-0:0.18-5.el6_4.src", "product_id": "python-qpid-0:0.18-5.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.18-5.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-java-0:0.18-8.el6_4.src", "product": { "name": "qpid-java-0:0.18-8.el6_4.src", "product_id": "qpid-java-0:0.18-8.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java@0.18-8.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-tools-0:0.18-10.el6_4.src", "product": { "name": "qpid-tools-0:0.18-10.el6_4.src", "product_id": "qpid-tools-0:0.18-10.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.18-10.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-cpp-0:0.18-17.el6_4.src", "product": { "name": "qpid-cpp-0:0.18-17.el6_4.src", "product_id": "qpid-cpp-0:0.18-17.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp@0.18-17.el6_4?arch=src" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.18-18.el6_4.src", "product": { "name": "qpid-qmf-0:0.18-18.el6_4.src", "product_id": "qpid-qmf-0:0.18-18.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.18-18.el6_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "product": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "product_id": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.18-17.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "product": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_id": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "product": { "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_id": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "product": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "product_id": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.18-18.el6_4.x86_64", "product": { "name": "qpid-qmf-0:0.18-18.el6_4.x86_64", "product_id": "qpid-qmf-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.18-18.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "product": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "product_id": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.18-18.el6_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "product": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "product_id": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.18-17.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "product": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "product_id": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.18-18.el6_4.i686", "product": { "name": "qpid-qmf-0:0.18-18.el6_4.i686", "product_id": "qpid-qmf-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "product": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "product_id": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "product": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "product_id": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.18-18.el6_4?arch=i686" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.18-18.el6_4.i686", "product": { "name": "python-qpid-qmf-0:0.18-18.el6_4.i686", "product_id": "python-qpid-qmf-0:0.18-18.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.18-18.el6_4?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.noarch as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch" }, "product_reference": "python-qpid-0:0.18-5.el6_4.noarch", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src" }, "product_reference": "python-qpid-0:0.18-5.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-0:0.18-17.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src" }, "product_reference": "qpid-cpp-0:0.18-17.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.noarch as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.noarch", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch" }, "product_reference": "python-qpid-0:0.18-5.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.18-5.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src" }, "product_reference": "python-qpid-0:0.18-5.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "python-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-0:0.18-17.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src" }, "product_reference": "qpid-cpp-0:0.18-17.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-0:0.18-8.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src" }, "product_reference": "qpid-java-0:0.18-8.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-client-0:0.18-8.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch" }, "product_reference": "qpid-java-client-0:0.18-8.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-common-0:0.18-8.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch" }, "product_reference": "qpid-java-common-0:0.18-8.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-example-0:0.18-8.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch" }, "product_reference": "qpid-java-example-0:0.18-8.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.18-10.el6_4.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src" }, "product_reference": "qpid-tools-0:0.18-10.el6_4.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" }, "product_reference": "ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Petr Matousek" ], "organization": "Red Hat MRG Messaging team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-1909", "discovery_date": "2013-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "928530" } ], "notes": [ { "category": "description", "text": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-qpid: client does not validate qpid server TLS/SSL certificate", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1909" }, { "category": "external", "summary": "RHBZ#928530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928530" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1909", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1909" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1909", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1909" }, { "category": "external", "summary": "http://qpid.apache.org/release_notes_0.22.html", "url": "http://qpid.apache.org/release_notes_0.22.html" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/QPID-4918", "url": "https://issues.apache.org/jira/browse/QPID-4918" } ], "release_date": "2013-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-11T13:21:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1024" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-0:0.18-5.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-0:0.18-17.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.noarch", "6ComputeNode-MRG-Grid-Execute-Node-2:qpid-tools-0:0.18-10.el6_4.src", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.noarch", "6Server-MRG-Messaging-2:python-qpid-0:0.18-5.el6_4.src", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:python-qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.18-17.el6_4.src", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.18-17.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.18-17.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.18-8.el6_4.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.18-8.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.src", "6Server-MRG-Messaging-2:qpid-qmf-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.18-18.el6_4.x86_64", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.noarch", "6Server-MRG-Messaging-2:qpid-tools-0:0.18-10.el6_4.src", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.i686", "6Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.18-18.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-qpid: client does not validate qpid server TLS/SSL certificate" } ] }
pysec-2013-25
Vulnerability from pysec
Published
2013-08-23 16:55
Modified
2021-07-25 23:34
Details
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Aliases
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "qpid-python", "purl": "pkg:pypi/qpid-python" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.22" } ], "type": "ECOSYSTEM" } ], "versions": [ "0.20" ] } ], "aliases": [ "CVE-2013-1909" ], "details": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.", "id": "PYSEC-2013-25", "modified": "2021-07-25T23:34:52.564224Z", "published": "2013-08-23T16:55:00Z", "references": [ { "type": "WEB", "url": "https://issues.apache.org/jira/browse/QPID-4918" }, { "type": "WEB", "url": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" }, { "type": "ADVISORY", "url": "http://secunia.com/advisories/54137" }, { "type": "ADVISORY", "url": "http://secunia.com/advisories/53968" }, { "type": "ADVISORY", "url": "http://rhn.redhat.com/errata/RHSA-2013-1024.html" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013" } ] }
gsd-2013-1909
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-1909", "description": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.", "id": "GSD-2013-1909", "references": [ "https://access.redhat.com/errata/RHSA-2013:1024" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-1909" ], "details": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.", "id": "GSD-2013-1909", "modified": "2023-12-13T01:22:20.095154Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1909", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "53968", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53968" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013" }, { "name": "https://issues.apache.org/jira/browse/QPID-4918", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/QPID-4918" }, { "name": "RHSA-2013:1024", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1024.html" }, { "name": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html", "refsource": "CONFIRM", "url": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" }, { "name": "54137", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54137" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1909" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://issues.apache.org/jira/browse/QPID-4918", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://issues.apache.org/jira/browse/QPID-4918" }, { "name": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html", "refsource": "CONFIRM", "tags": [], "url": "http://qpid.apache.org/releases/qpid-0.22/release-notes.html" }, { "name": "54137", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54137" }, { "name": "53968", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53968" }, { "name": "RHSA-2013:1024", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1024.html" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1460013" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2021-07-15T19:16Z", "publishedDate": "2013-08-23T16:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.