Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2011-3620
Vulnerability from cvelistv5
Published
2012-05-03 23:00
Modified
2024-08-06 23:37
Severity ?
EPSS score ?
Summary
Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:37:48.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49000", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49000" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/QPID-3652" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://reviews.apache.org/r/2988/" }, { "name": "1026990", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026990" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-06-09T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "49000", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49000" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/QPID-3652" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://reviews.apache.org/r/2988/" }, { "name": "1026990", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026990" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-3620", "datePublished": "2012-05-03T23:00:00", "dateReserved": "2011-09-21T00:00:00", "dateUpdated": "2024-08-06T23:37:48.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-3620\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-05-03T23:55:01.027\",\"lastModified\":\"2024-11-21T01:30:51.890\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.\"},{\"lang\":\"es\",\"value\":\"Apache Qpid v0.12 no verifica correctamente las credenciales durante la uni\u00f3n de un grupo, lo que permite a atacantes remotos obtener acceso a la funcionalidad de mensajer\u00eda y funcionalidad de trabajo de un grupo mediante el aprovechamiento de los conocimientos, nombre de usuario.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C584B299-0BB9-4B4F-B0BC-11DE222F1F17\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/49000\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1026990\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=747078\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.apache.org/jira/browse/QPID-3652\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://reviews.apache.org/r/2988/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/49000\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1026990\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=747078\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.apache.org/jira/browse/QPID-3652\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://reviews.apache.org/r/2988/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2011-3620
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2011-3620", "description": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.", "id": "GSD-2011-3620", "references": [ "https://access.redhat.com/errata/RHSA-2012:0529", "https://access.redhat.com/errata/RHSA-2012:0528" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-3620" ], "details": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.", "id": "GSD-2011-3620", "modified": "2023-12-13T01:19:09.785241Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3620", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/49000", "refsource": "MISC", "url": "http://secunia.com/advisories/49000" }, { "name": "http://www.securitytracker.com/id?1026990", "refsource": "MISC", "url": "http://www.securitytracker.com/id?1026990" }, { "name": "https://issues.apache.org/jira/browse/QPID-3652", "refsource": "MISC", "url": "https://issues.apache.org/jira/browse/QPID-3652" }, { "name": "https://reviews.apache.org/r/2988/", "refsource": "MISC", "url": "https://reviews.apache.org/r/2988/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747078", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3620" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "https://reviews.apache.org/r/2988/", "refsource": "CONFIRM", "tags": [], "url": "https://reviews.apache.org/r/2988/" }, { "name": "https://issues.apache.org/jira/browse/QPID-3652", "refsource": "CONFIRM", "tags": [], "url": "https://issues.apache.org/jira/browse/QPID-3652" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=747078", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "name": "49000", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/49000" }, { "name": "1026990", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1026990" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2012-08-14T03:30Z", "publishedDate": "2012-05-03T23:55Z" } } }
rhsa-2012:0529
Vulnerability from csaf_redhat
Published
2012-04-30 17:40
Modified
2024-11-22 04:55
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update
Notes
Topic
Updated Messaging packages that resolve one security issue, fix multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2.1 for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.
It was found that Qpid accepted any password or SASL mechanism, provided
the remote user knew a valid cluster username. This could give a remote
attacker unauthorized access to the cluster, exposing cluster messages and
internal Qpid/MRG configurations. (CVE-2011-3620)
Note: If you are using an ACL, the cluster-username must be allowed to
publish to the qpid.cluster-credentials exchange. For example, if your
cluster-username is "foo", in your ACL file:
acl allow foo@QPID publish exchange name=qpid.cluster-credentials
The CVE-2011-3620 fix changes the cluster initialization protocol. As such,
the cluster with all new version brokers must be restarted for the changes
to take effect. Refer below for details.
These updated packages provide numerous enhancements and bug fixes for the
Messaging component of MRG. Space precludes documenting all of these
changes in this advisory. Documentation for these changes will be available
shortly in the Technical Notes document linked to in the References
section.
All users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are
advised to upgrade to these updated packages, which resolve the issues and
add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.
After installing the updated packages, stop the cluster by either running
"service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one
of the cluster nodes. Once stopped, restart the cluster with
"service qpidd start" on all nodes for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Messaging packages that resolve one security issue, fix multiple\nbugs, and add various enhancements are now available for Red Hat Enterprise\nMRG 2.1 for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Messaging is a high-speed reliable messaging distribution for Linux\nbased on AMQP (Advanced Message Queuing Protocol), an open protocol\nstandard for enterprise messaging that is designed to make mission critical\nmessaging widely available as a standard service, and to make enterprise\nmessaging interoperable across platforms, programming languages, and\nvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10\nclient libraries for C++, Java JMS, and Python; as well as persistence\nlibraries and management tools.\n\nIt was found that Qpid accepted any password or SASL mechanism, provided\nthe remote user knew a valid cluster username. This could give a remote\nattacker unauthorized access to the cluster, exposing cluster messages and\ninternal Qpid/MRG configurations. (CVE-2011-3620)\n\nNote: If you are using an ACL, the cluster-username must be allowed to\npublish to the qpid.cluster-credentials exchange. For example, if your\ncluster-username is \"foo\", in your ACL file:\n\nacl allow foo@QPID publish exchange name=qpid.cluster-credentials\n\nThe CVE-2011-3620 fix changes the cluster initialization protocol. As such,\nthe cluster with all new version brokers must be restarted for the changes\nto take effect. Refer below for details.\n\nThese updated packages provide numerous enhancements and bug fixes for the\nMessaging component of MRG. Space precludes documenting all of these\nchanges in this advisory. Documentation for these changes will be available\nshortly in the Technical Notes document linked to in the References\nsection.\n\nAll users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are\nadvised to upgrade to these updated packages, which resolve the issues and\nadd the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.\nAfter installing the updated packages, stop the cluster by either running\n\"service qpidd stop\" on all nodes, or \"qpid-cluster --all-stop\" on any one\nof the cluster nodes. Once stopped, restart the cluster with\n\"service qpidd start\" on all nodes for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0529", "url": "https://access.redhat.com/errata/RHSA-2012:0529" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0529", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0529" }, { "category": "external", "summary": "650969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=650969" }, { "category": "external", "summary": "674379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674379" }, { "category": "external", "summary": "691654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=691654" }, { "category": "external", "summary": "700632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=700632" }, { "category": "external", "summary": "704596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=704596" }, { "category": "external", "summary": "705418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705418" }, { "category": "external", "summary": "726102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726102" }, { "category": "external", "summary": "727182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727182" }, { "category": "external", "summary": "730981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730981" }, { "category": "external", "summary": "731368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731368" }, { "category": "external", "summary": "733241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=733241" }, { "category": "external", "summary": "733383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=733383" }, { "category": "external", "summary": "734729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=734729" }, { "category": "external", "summary": "735208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735208" }, { "category": "external", "summary": "747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "external", "summary": "751845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=751845" }, { "category": "external", "summary": "760112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760112" }, { "category": "external", "summary": "760636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760636" }, { "category": "external", "summary": "761186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761186" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0529.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:55:03+00:00", "generator": { "date": "2024-11-22T04:55:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0529", "initial_release_date": "2012-04-30T17:40:00+00:00", "revision_history": [ { "date": "2012-04-30T17:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-04-30T17:48:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:55:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Messaging for RHEL 5 Server v.2", "product": { "name": "Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } }, { "category": "product_name", "name": "MRG Grid for RHEL 5 Server v.2", "product": { "name": "MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } }, { "category": "product_name", "name": "MRG Management for RHEL 5 Server v.2", "product": { "name": "MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } }, { "category": "product_name", "name": "MRG Grid Execute Node for RHEL 5 Server v.2", "product": { "name": "MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "qpid-tests-0:0.14-1.el5.src", "product": { "name": "qpid-tests-0:0.14-1.el5.src", "product_id": "qpid-tests-0:0.14-1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tests@0.14-1.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-java-0:0.14-3.el5.src", "product": { "name": "qpid-java-0:0.14-3.el5.src", "product_id": "qpid-java-0:0.14-3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java@0.14-3.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el5.src", "product": { "name": "qpid-jca-0:0.14-9.el5.src", "product_id": "qpid-jca-0:0.14-9.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-cpp-mrg-0:0.14-14.el5.src", "product": { "name": "qpid-cpp-mrg-0:0.14-14.el5.src", "product_id": "qpid-cpp-mrg-0:0.14-14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-mrg@0.14-14.el5?arch=src" } } }, { "category": "product_version", "name": "sesame-0:1.0-3.el5.src", "product": { "name": "sesame-0:1.0-3.el5.src", "product_id": "sesame-0:1.0-3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-3.el5?arch=src" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el5.src", "product": { "name": "condor-0:7.6.5-0.14.el5.src", "product_id": "condor-0:7.6.5-0.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el5?arch=src" } } }, { "category": "product_version", "name": "python-qpid-0:0.14-6.el5.src", "product": { "name": "python-qpid-0:0.14-6.el5.src", "product_id": "python-qpid-0:0.14-6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.14-6.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-tools-0:0.14-2.el5.src", "product": { "name": "qpid-tools-0:0.14-2.el5.src", "product_id": "qpid-tools-0:0.14-2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.14-2.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-9.el5.src", "product": { "name": "qpid-qmf-0:0.14-9.el5.src", "product_id": "qpid-qmf-0:0.14-9.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-9.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qpid-tests-0:0.14-1.el5.noarch", "product": { "name": "qpid-tests-0:0.14-1.el5.noarch", "product_id": "qpid-tests-0:0.14-1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tests@0.14-1.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-example-0:0.14-3.el5.noarch", "product": { "name": "qpid-java-example-0:0.14-3.el5.noarch", "product_id": "qpid-java-example-0:0.14-3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-example@0.14-3.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-common-0:0.14-3.el5.noarch", "product": { "name": "qpid-java-common-0:0.14-3.el5.noarch", "product_id": "qpid-java-common-0:0.14-3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-common@0.14-3.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-client-0:0.14-3.el5.noarch", "product": { "name": "qpid-java-client-0:0.14-3.el5.noarch", "product_id": "qpid-java-client-0:0.14-3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-client@0.14-3.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "product": { "name": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "product_id": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca-xarecovery@0.14-9.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el5.noarch", "product": { "name": "qpid-jca-0:0.14-9.el5.noarch", "product_id": "qpid-jca-0:0.14-9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el5?arch=noarch" } } }, { "category": "product_version", "name": "python-qpid-0:0.14-6.el5.noarch", "product": { "name": "python-qpid-0:0.14-6.el5.noarch", "product_id": "python-qpid-0:0.14-6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.14-6.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-tools-0:0.14-2.el5.noarch", "product": { "name": "qpid-tools-0:0.14-2.el5.noarch", "product_id": "qpid-tools-0:0.14-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.14-2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-mrg-debuginfo@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "sesame-0:1.0-3.el5.x86_64", "product": { "name": "sesame-0:1.0-3.el5.x86_64", "product_id": "sesame-0:1.0-3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-3.el5.x86_64", "product": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64", "product_id": "sesame-debuginfo-0:1.0-3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-classads-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-classads-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-vm-gahp@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-9.el5.x86_64", "product": { "name": "qpid-qmf-0:0.14-9.el5.x86_64", "product_id": "qpid-qmf-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "product": { "name": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "product_id": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.14-9.el5.x86_64", "product": { "name": "python-qpid-qmf-0:0.14-9.el5.x86_64", "product_id": "python-qpid-qmf-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "product": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "product_id": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "product": { "name": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "product_id": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.14-9.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-store-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "product_id": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-mrg-debuginfo@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "sesame-0:1.0-3.el5.i386", "product": { "name": "sesame-0:1.0-3.el5.i386", "product_id": "sesame-0:1.0-3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-3.el5?arch=i386" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-3.el5.i386", "product": { "name": "sesame-debuginfo-0:1.0-3.el5.i386", "product_id": "sesame-debuginfo-0:1.0-3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-3.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-classads-0:7.6.5-0.14.el5.i386", "product_id": "condor-classads-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el5.i386", "product_id": "condor-kbdd-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-aviary-0:7.6.5-0.14.el5.i386", "product_id": "condor-aviary-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-qmf-0:7.6.5-0.14.el5.i386", "product_id": "condor-qmf-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "product_id": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "product_id": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-vm-gahp@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-0:7.6.5-0.14.el5.i386", "product_id": "condor-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-9.el5.i386", "product": { "name": "qpid-qmf-0:0.14-9.el5.i386", "product_id": "qpid-qmf-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-9.el5.i386", "product": { "name": "qpid-qmf-devel-0:0.14-9.el5.i386", "product_id": "qpid-qmf-devel-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.14-9.el5.i386", "product": { "name": "python-qpid-qmf-0:0.14-9.el5.i386", "product_id": "python-qpid-qmf-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "product": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "product_id": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.14-9.el5.i386", "product": { "name": "ruby-qpid-qmf-0:0.14-9.el5.i386", "product_id": "ruby-qpid-qmf-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.14-9.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.src as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src" }, "product_reference": "condor-0:7.6.5-0.14.el5.src", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386" }, "product_reference": "sesame-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.src as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src" }, "product_reference": "sesame-0:1.0-3.el5.src", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.src as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src" }, "product_reference": "condor-0:7.6.5-0.14.el5.src", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.i386 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386" }, "product_reference": "sesame-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.src as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src" }, "product_reference": "sesame-0:1.0-3.el5.src", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.x86_64 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.i386 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.14-6.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch" }, "product_reference": "python-qpid-0:0.14-6.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.14-6.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src" }, "product_reference": "python-qpid-0:0.14-6.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386" }, "product_reference": "python-qpid-qmf-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64" }, "product_reference": "python-qpid-qmf-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-mrg-0:0.14-14.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src" }, "product_reference": "qpid-cpp-mrg-0:0.14-14.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-0:0.14-3.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src" }, "product_reference": "qpid-java-0:0.14-3.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-client-0:0.14-3.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch" }, "product_reference": "qpid-java-client-0:0.14-3.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-common-0:0.14-3.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch" }, "product_reference": "qpid-java-common-0:0.14-3.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-example-0:0.14-3.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch" }, "product_reference": "qpid-java-example-0:0.14-3.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch" }, "product_reference": "qpid-jca-0:0.14-9.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src" }, "product_reference": "qpid-jca-0:0.14-9.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-xarecovery-0:0.14-9.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch" }, "product_reference": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386" }, "product_reference": "qpid-qmf-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-9.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src" }, "product_reference": "qpid-qmf-0:0.14-9.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64" }, "product_reference": "qpid-qmf-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386" }, "product_reference": "qpid-qmf-devel-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tests-0:0.14-1.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch" }, "product_reference": "qpid-tests-0:0.14-1.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tests-0:0.14-1.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src" }, "product_reference": "qpid-tests-0:0.14-1.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.14-2.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch" }, "product_reference": "qpid-tools-0:0.14-2.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.14-2.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src" }, "product_reference": "qpid-tools-0:0.14-2.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386" }, "product_reference": "ruby-qpid-qmf-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64" }, "product_reference": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386" }, "product_reference": "sesame-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src" }, "product_reference": "sesame-0:1.0-3.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3620", "discovery_date": "2011-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747078" } ], "notes": [ { "category": "description", "text": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.", "title": "Vulnerability description" }, { "category": "summary", "text": "qpid-cpp: cluster authentication ignores cluster-* settings", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects the clustered implementation in qpid-cpp (qpidd-cpp-server-cluster) which is only available in Red Hat Enterprise MRG. The qpid-cpp-server as provided with Red Hat Enterprise Linux 6 does not include this functionality, and is thus not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src", "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3620" }, { "category": "external", "summary": "RHBZ#747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620" } ], "release_date": "2012-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-30T17:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src", "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0529" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src", "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "qpid-cpp: cluster authentication ignores cluster-* settings" } ] }
RHSA-2012:0529
Vulnerability from csaf_redhat
Published
2012-04-30 17:40
Modified
2024-11-22 04:55
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update
Notes
Topic
Updated Messaging packages that resolve one security issue, fix multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2.1 for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.
It was found that Qpid accepted any password or SASL mechanism, provided
the remote user knew a valid cluster username. This could give a remote
attacker unauthorized access to the cluster, exposing cluster messages and
internal Qpid/MRG configurations. (CVE-2011-3620)
Note: If you are using an ACL, the cluster-username must be allowed to
publish to the qpid.cluster-credentials exchange. For example, if your
cluster-username is "foo", in your ACL file:
acl allow foo@QPID publish exchange name=qpid.cluster-credentials
The CVE-2011-3620 fix changes the cluster initialization protocol. As such,
the cluster with all new version brokers must be restarted for the changes
to take effect. Refer below for details.
These updated packages provide numerous enhancements and bug fixes for the
Messaging component of MRG. Space precludes documenting all of these
changes in this advisory. Documentation for these changes will be available
shortly in the Technical Notes document linked to in the References
section.
All users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are
advised to upgrade to these updated packages, which resolve the issues and
add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.
After installing the updated packages, stop the cluster by either running
"service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one
of the cluster nodes. Once stopped, restart the cluster with
"service qpidd start" on all nodes for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Messaging packages that resolve one security issue, fix multiple\nbugs, and add various enhancements are now available for Red Hat Enterprise\nMRG 2.1 for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Messaging is a high-speed reliable messaging distribution for Linux\nbased on AMQP (Advanced Message Queuing Protocol), an open protocol\nstandard for enterprise messaging that is designed to make mission critical\nmessaging widely available as a standard service, and to make enterprise\nmessaging interoperable across platforms, programming languages, and\nvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10\nclient libraries for C++, Java JMS, and Python; as well as persistence\nlibraries and management tools.\n\nIt was found that Qpid accepted any password or SASL mechanism, provided\nthe remote user knew a valid cluster username. This could give a remote\nattacker unauthorized access to the cluster, exposing cluster messages and\ninternal Qpid/MRG configurations. (CVE-2011-3620)\n\nNote: If you are using an ACL, the cluster-username must be allowed to\npublish to the qpid.cluster-credentials exchange. For example, if your\ncluster-username is \"foo\", in your ACL file:\n\nacl allow foo@QPID publish exchange name=qpid.cluster-credentials\n\nThe CVE-2011-3620 fix changes the cluster initialization protocol. As such,\nthe cluster with all new version brokers must be restarted for the changes\nto take effect. Refer below for details.\n\nThese updated packages provide numerous enhancements and bug fixes for the\nMessaging component of MRG. Space precludes documenting all of these\nchanges in this advisory. Documentation for these changes will be available\nshortly in the Technical Notes document linked to in the References\nsection.\n\nAll users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are\nadvised to upgrade to these updated packages, which resolve the issues and\nadd the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.\nAfter installing the updated packages, stop the cluster by either running\n\"service qpidd stop\" on all nodes, or \"qpid-cluster --all-stop\" on any one\nof the cluster nodes. Once stopped, restart the cluster with\n\"service qpidd start\" on all nodes for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0529", "url": "https://access.redhat.com/errata/RHSA-2012:0529" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0529", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0529" }, { "category": "external", "summary": "650969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=650969" }, { "category": "external", "summary": "674379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674379" }, { "category": "external", "summary": "691654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=691654" }, { "category": "external", "summary": "700632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=700632" }, { "category": "external", "summary": "704596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=704596" }, { "category": "external", "summary": "705418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705418" }, { "category": "external", "summary": "726102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726102" }, { "category": "external", "summary": "727182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727182" }, { "category": "external", "summary": "730981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730981" }, { "category": "external", "summary": "731368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731368" }, { "category": "external", "summary": "733241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=733241" }, { "category": "external", "summary": "733383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=733383" }, { "category": "external", "summary": "734729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=734729" }, { "category": "external", "summary": "735208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735208" }, { "category": "external", "summary": "747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "external", "summary": "751845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=751845" }, { "category": "external", "summary": "760112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760112" }, { "category": "external", "summary": "760636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760636" }, { "category": "external", "summary": "761186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761186" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0529.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:55:03+00:00", "generator": { "date": "2024-11-22T04:55:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0529", "initial_release_date": "2012-04-30T17:40:00+00:00", "revision_history": [ { "date": "2012-04-30T17:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-04-30T17:48:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:55:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Messaging for RHEL 5 Server v.2", "product": { "name": "Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } }, { "category": "product_name", "name": "MRG Grid for RHEL 5 Server v.2", "product": { "name": "MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } }, { "category": "product_name", "name": "MRG Management for RHEL 5 Server v.2", "product": { "name": "MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } }, { "category": "product_name", "name": "MRG Grid Execute Node for RHEL 5 Server v.2", "product": { "name": "MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "qpid-tests-0:0.14-1.el5.src", "product": { "name": "qpid-tests-0:0.14-1.el5.src", "product_id": "qpid-tests-0:0.14-1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tests@0.14-1.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-java-0:0.14-3.el5.src", "product": { "name": "qpid-java-0:0.14-3.el5.src", "product_id": "qpid-java-0:0.14-3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java@0.14-3.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el5.src", "product": { "name": "qpid-jca-0:0.14-9.el5.src", "product_id": "qpid-jca-0:0.14-9.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-cpp-mrg-0:0.14-14.el5.src", "product": { "name": "qpid-cpp-mrg-0:0.14-14.el5.src", "product_id": "qpid-cpp-mrg-0:0.14-14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-mrg@0.14-14.el5?arch=src" } } }, { "category": "product_version", "name": "sesame-0:1.0-3.el5.src", "product": { "name": "sesame-0:1.0-3.el5.src", "product_id": "sesame-0:1.0-3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-3.el5?arch=src" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el5.src", "product": { "name": "condor-0:7.6.5-0.14.el5.src", "product_id": "condor-0:7.6.5-0.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el5?arch=src" } } }, { "category": "product_version", "name": "python-qpid-0:0.14-6.el5.src", "product": { "name": "python-qpid-0:0.14-6.el5.src", "product_id": "python-qpid-0:0.14-6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.14-6.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-tools-0:0.14-2.el5.src", "product": { "name": "qpid-tools-0:0.14-2.el5.src", "product_id": "qpid-tools-0:0.14-2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.14-2.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-9.el5.src", "product": { "name": "qpid-qmf-0:0.14-9.el5.src", "product_id": "qpid-qmf-0:0.14-9.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-9.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qpid-tests-0:0.14-1.el5.noarch", "product": { "name": "qpid-tests-0:0.14-1.el5.noarch", "product_id": "qpid-tests-0:0.14-1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tests@0.14-1.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-example-0:0.14-3.el5.noarch", "product": { "name": "qpid-java-example-0:0.14-3.el5.noarch", "product_id": "qpid-java-example-0:0.14-3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-example@0.14-3.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-common-0:0.14-3.el5.noarch", "product": { "name": "qpid-java-common-0:0.14-3.el5.noarch", "product_id": "qpid-java-common-0:0.14-3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-common@0.14-3.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-client-0:0.14-3.el5.noarch", "product": { "name": "qpid-java-client-0:0.14-3.el5.noarch", "product_id": "qpid-java-client-0:0.14-3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-client@0.14-3.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "product": { "name": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "product_id": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca-xarecovery@0.14-9.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el5.noarch", "product": { "name": "qpid-jca-0:0.14-9.el5.noarch", "product_id": "qpid-jca-0:0.14-9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el5?arch=noarch" } } }, { "category": "product_version", "name": "python-qpid-0:0.14-6.el5.noarch", "product": { "name": "python-qpid-0:0.14-6.el5.noarch", "product_id": "python-qpid-0:0.14-6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.14-6.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-tools-0:0.14-2.el5.noarch", "product": { "name": "qpid-tools-0:0.14-2.el5.noarch", "product_id": "qpid-tools-0:0.14-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.14-2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-mrg-debuginfo@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "sesame-0:1.0-3.el5.x86_64", "product": { "name": "sesame-0:1.0-3.el5.x86_64", "product_id": "sesame-0:1.0-3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-3.el5.x86_64", "product": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64", "product_id": "sesame-debuginfo-0:1.0-3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-classads-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-classads-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-vm-gahp@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-9.el5.x86_64", "product": { "name": "qpid-qmf-0:0.14-9.el5.x86_64", "product_id": "qpid-qmf-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "product": { "name": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "product_id": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.14-9.el5.x86_64", "product": { "name": "python-qpid-qmf-0:0.14-9.el5.x86_64", "product_id": "python-qpid-qmf-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "product": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "product_id": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "product": { "name": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "product_id": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.14-9.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-store-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "product_id": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-mrg-debuginfo@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "sesame-0:1.0-3.el5.i386", "product": { "name": "sesame-0:1.0-3.el5.i386", "product_id": "sesame-0:1.0-3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-3.el5?arch=i386" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-3.el5.i386", "product": { "name": "sesame-debuginfo-0:1.0-3.el5.i386", "product_id": "sesame-debuginfo-0:1.0-3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-3.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-classads-0:7.6.5-0.14.el5.i386", "product_id": "condor-classads-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el5.i386", "product_id": "condor-kbdd-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-aviary-0:7.6.5-0.14.el5.i386", "product_id": "condor-aviary-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-qmf-0:7.6.5-0.14.el5.i386", "product_id": "condor-qmf-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "product_id": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "product_id": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-vm-gahp@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-0:7.6.5-0.14.el5.i386", "product_id": "condor-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-9.el5.i386", "product": { "name": "qpid-qmf-0:0.14-9.el5.i386", "product_id": "qpid-qmf-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-9.el5.i386", "product": { "name": "qpid-qmf-devel-0:0.14-9.el5.i386", "product_id": "qpid-qmf-devel-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.14-9.el5.i386", "product": { "name": "python-qpid-qmf-0:0.14-9.el5.i386", "product_id": "python-qpid-qmf-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "product": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "product_id": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.14-9.el5.i386", "product": { "name": "ruby-qpid-qmf-0:0.14-9.el5.i386", "product_id": "ruby-qpid-qmf-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.14-9.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.src as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src" }, "product_reference": "condor-0:7.6.5-0.14.el5.src", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386" }, "product_reference": "sesame-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.src as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src" }, "product_reference": "sesame-0:1.0-3.el5.src", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.src as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src" }, "product_reference": "condor-0:7.6.5-0.14.el5.src", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.i386 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386" }, "product_reference": "sesame-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.src as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src" }, "product_reference": "sesame-0:1.0-3.el5.src", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.x86_64 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.i386 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.14-6.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch" }, "product_reference": "python-qpid-0:0.14-6.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.14-6.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src" }, "product_reference": "python-qpid-0:0.14-6.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386" }, "product_reference": "python-qpid-qmf-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64" }, "product_reference": "python-qpid-qmf-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-mrg-0:0.14-14.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src" }, "product_reference": "qpid-cpp-mrg-0:0.14-14.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-0:0.14-3.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src" }, "product_reference": "qpid-java-0:0.14-3.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-client-0:0.14-3.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch" }, "product_reference": "qpid-java-client-0:0.14-3.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-common-0:0.14-3.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch" }, "product_reference": "qpid-java-common-0:0.14-3.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-example-0:0.14-3.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch" }, "product_reference": "qpid-java-example-0:0.14-3.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch" }, "product_reference": "qpid-jca-0:0.14-9.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src" }, "product_reference": "qpid-jca-0:0.14-9.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-xarecovery-0:0.14-9.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch" }, "product_reference": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386" }, "product_reference": "qpid-qmf-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-9.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src" }, "product_reference": "qpid-qmf-0:0.14-9.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64" }, "product_reference": "qpid-qmf-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386" }, "product_reference": "qpid-qmf-devel-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tests-0:0.14-1.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch" }, "product_reference": "qpid-tests-0:0.14-1.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tests-0:0.14-1.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src" }, "product_reference": "qpid-tests-0:0.14-1.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.14-2.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch" }, "product_reference": "qpid-tools-0:0.14-2.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.14-2.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src" }, "product_reference": "qpid-tools-0:0.14-2.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386" }, "product_reference": "ruby-qpid-qmf-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64" }, "product_reference": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386" }, "product_reference": "sesame-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src" }, "product_reference": "sesame-0:1.0-3.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3620", "discovery_date": "2011-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747078" } ], "notes": [ { "category": "description", "text": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.", "title": "Vulnerability description" }, { "category": "summary", "text": "qpid-cpp: cluster authentication ignores cluster-* settings", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects the clustered implementation in qpid-cpp (qpidd-cpp-server-cluster) which is only available in Red Hat Enterprise MRG. The qpid-cpp-server as provided with Red Hat Enterprise Linux 6 does not include this functionality, and is thus not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src", "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3620" }, { "category": "external", "summary": "RHBZ#747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620" } ], "release_date": "2012-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-30T17:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src", "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0529" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src", "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "qpid-cpp: cluster authentication ignores cluster-* settings" } ] }
rhsa-2012_0529
Vulnerability from csaf_redhat
Published
2012-04-30 17:40
Modified
2024-11-22 04:55
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update
Notes
Topic
Updated Messaging packages that resolve one security issue, fix multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2.1 for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.
It was found that Qpid accepted any password or SASL mechanism, provided
the remote user knew a valid cluster username. This could give a remote
attacker unauthorized access to the cluster, exposing cluster messages and
internal Qpid/MRG configurations. (CVE-2011-3620)
Note: If you are using an ACL, the cluster-username must be allowed to
publish to the qpid.cluster-credentials exchange. For example, if your
cluster-username is "foo", in your ACL file:
acl allow foo@QPID publish exchange name=qpid.cluster-credentials
The CVE-2011-3620 fix changes the cluster initialization protocol. As such,
the cluster with all new version brokers must be restarted for the changes
to take effect. Refer below for details.
These updated packages provide numerous enhancements and bug fixes for the
Messaging component of MRG. Space precludes documenting all of these
changes in this advisory. Documentation for these changes will be available
shortly in the Technical Notes document linked to in the References
section.
All users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are
advised to upgrade to these updated packages, which resolve the issues and
add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.
After installing the updated packages, stop the cluster by either running
"service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one
of the cluster nodes. Once stopped, restart the cluster with
"service qpidd start" on all nodes for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Messaging packages that resolve one security issue, fix multiple\nbugs, and add various enhancements are now available for Red Hat Enterprise\nMRG 2.1 for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Messaging is a high-speed reliable messaging distribution for Linux\nbased on AMQP (Advanced Message Queuing Protocol), an open protocol\nstandard for enterprise messaging that is designed to make mission critical\nmessaging widely available as a standard service, and to make enterprise\nmessaging interoperable across platforms, programming languages, and\nvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10\nclient libraries for C++, Java JMS, and Python; as well as persistence\nlibraries and management tools.\n\nIt was found that Qpid accepted any password or SASL mechanism, provided\nthe remote user knew a valid cluster username. This could give a remote\nattacker unauthorized access to the cluster, exposing cluster messages and\ninternal Qpid/MRG configurations. (CVE-2011-3620)\n\nNote: If you are using an ACL, the cluster-username must be allowed to\npublish to the qpid.cluster-credentials exchange. For example, if your\ncluster-username is \"foo\", in your ACL file:\n\nacl allow foo@QPID publish exchange name=qpid.cluster-credentials\n\nThe CVE-2011-3620 fix changes the cluster initialization protocol. As such,\nthe cluster with all new version brokers must be restarted for the changes\nto take effect. Refer below for details.\n\nThese updated packages provide numerous enhancements and bug fixes for the\nMessaging component of MRG. Space precludes documenting all of these\nchanges in this advisory. Documentation for these changes will be available\nshortly in the Technical Notes document linked to in the References\nsection.\n\nAll users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are\nadvised to upgrade to these updated packages, which resolve the issues and\nadd the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.\nAfter installing the updated packages, stop the cluster by either running\n\"service qpidd stop\" on all nodes, or \"qpid-cluster --all-stop\" on any one\nof the cluster nodes. Once stopped, restart the cluster with\n\"service qpidd start\" on all nodes for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0529", "url": "https://access.redhat.com/errata/RHSA-2012:0529" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0529", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0529" }, { "category": "external", "summary": "650969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=650969" }, { "category": "external", "summary": "674379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674379" }, { "category": "external", "summary": "691654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=691654" }, { "category": "external", "summary": "700632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=700632" }, { "category": "external", "summary": "704596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=704596" }, { "category": "external", "summary": "705418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705418" }, { "category": "external", "summary": "726102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726102" }, { "category": "external", "summary": "727182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727182" }, { "category": "external", "summary": "730981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730981" }, { "category": "external", "summary": "731368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731368" }, { "category": "external", "summary": "733241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=733241" }, { "category": "external", "summary": "733383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=733383" }, { "category": "external", "summary": "734729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=734729" }, { "category": "external", "summary": "735208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735208" }, { "category": "external", "summary": "747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "external", "summary": "751845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=751845" }, { "category": "external", "summary": "760112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760112" }, { "category": "external", "summary": "760636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760636" }, { "category": "external", "summary": "761186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761186" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0529.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:55:03+00:00", "generator": { "date": "2024-11-22T04:55:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0529", "initial_release_date": "2012-04-30T17:40:00+00:00", "revision_history": [ { "date": "2012-04-30T17:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-04-30T17:48:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:55:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Messaging for RHEL 5 Server v.2", "product": { "name": "Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } }, { "category": "product_name", "name": "MRG Grid for RHEL 5 Server v.2", "product": { "name": "MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } }, { "category": "product_name", "name": "MRG Management for RHEL 5 Server v.2", "product": { "name": "MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } }, { "category": "product_name", "name": "MRG Grid Execute Node for RHEL 5 Server v.2", "product": { "name": "MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "qpid-tests-0:0.14-1.el5.src", "product": { "name": "qpid-tests-0:0.14-1.el5.src", "product_id": "qpid-tests-0:0.14-1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tests@0.14-1.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-java-0:0.14-3.el5.src", "product": { "name": "qpid-java-0:0.14-3.el5.src", "product_id": "qpid-java-0:0.14-3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java@0.14-3.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el5.src", "product": { "name": "qpid-jca-0:0.14-9.el5.src", "product_id": "qpid-jca-0:0.14-9.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-cpp-mrg-0:0.14-14.el5.src", "product": { "name": "qpid-cpp-mrg-0:0.14-14.el5.src", "product_id": "qpid-cpp-mrg-0:0.14-14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-mrg@0.14-14.el5?arch=src" } } }, { "category": "product_version", "name": "sesame-0:1.0-3.el5.src", "product": { "name": "sesame-0:1.0-3.el5.src", "product_id": "sesame-0:1.0-3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-3.el5?arch=src" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el5.src", "product": { "name": "condor-0:7.6.5-0.14.el5.src", "product_id": "condor-0:7.6.5-0.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el5?arch=src" } } }, { "category": "product_version", "name": "python-qpid-0:0.14-6.el5.src", "product": { "name": "python-qpid-0:0.14-6.el5.src", "product_id": "python-qpid-0:0.14-6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.14-6.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-tools-0:0.14-2.el5.src", "product": { "name": "qpid-tools-0:0.14-2.el5.src", "product_id": "qpid-tools-0:0.14-2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.14-2.el5?arch=src" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-9.el5.src", "product": { "name": "qpid-qmf-0:0.14-9.el5.src", "product_id": "qpid-qmf-0:0.14-9.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-9.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qpid-tests-0:0.14-1.el5.noarch", "product": { "name": "qpid-tests-0:0.14-1.el5.noarch", "product_id": "qpid-tests-0:0.14-1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tests@0.14-1.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-example-0:0.14-3.el5.noarch", "product": { "name": "qpid-java-example-0:0.14-3.el5.noarch", "product_id": "qpid-java-example-0:0.14-3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-example@0.14-3.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-common-0:0.14-3.el5.noarch", "product": { "name": "qpid-java-common-0:0.14-3.el5.noarch", "product_id": "qpid-java-common-0:0.14-3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-common@0.14-3.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-client-0:0.14-3.el5.noarch", "product": { "name": "qpid-java-client-0:0.14-3.el5.noarch", "product_id": "qpid-java-client-0:0.14-3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-client@0.14-3.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "product": { "name": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "product_id": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca-xarecovery@0.14-9.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el5.noarch", "product": { "name": "qpid-jca-0:0.14-9.el5.noarch", "product_id": "qpid-jca-0:0.14-9.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el5?arch=noarch" } } }, { "category": "product_version", "name": "python-qpid-0:0.14-6.el5.noarch", "product": { "name": "python-qpid-0:0.14-6.el5.noarch", "product_id": "python-qpid-0:0.14-6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid@0.14-6.el5?arch=noarch" } } }, { "category": "product_version", "name": "qpid-tools-0:0.14-2.el5.noarch", "product": { "name": "qpid-tools-0:0.14-2.el5.noarch", "product_id": "qpid-tools-0:0.14-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-tools@0.14-2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-mrg-debuginfo@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "sesame-0:1.0-3.el5.x86_64", "product": { "name": "sesame-0:1.0-3.el5.x86_64", "product_id": "sesame-0:1.0-3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-3.el5.x86_64", "product": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64", "product_id": "sesame-debuginfo-0:1.0-3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-classads-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-classads-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-vm-gahp@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el5.x86_64", "product": { "name": "condor-0:7.6.5-0.14.el5.x86_64", "product_id": "condor-0:7.6.5-0.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-9.el5.x86_64", "product": { "name": "qpid-qmf-0:0.14-9.el5.x86_64", "product_id": "qpid-qmf-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "product": { "name": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "product_id": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.14-9.el5.x86_64", "product": { "name": "python-qpid-qmf-0:0.14-9.el5.x86_64", "product_id": "python-qpid-qmf-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "product": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "product_id": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-9.el5?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "product": { "name": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "product_id": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.14-9.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-store-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "product_id": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-mrg-debuginfo@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-ssl@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "product_id": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-ssl@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el5?arch=i386" } } }, { "category": "product_version", "name": "sesame-0:1.0-3.el5.i386", "product": { "name": "sesame-0:1.0-3.el5.i386", "product_id": "sesame-0:1.0-3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-3.el5?arch=i386" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-3.el5.i386", "product": { "name": "sesame-debuginfo-0:1.0-3.el5.i386", "product_id": "sesame-debuginfo-0:1.0-3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-3.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-classads-0:7.6.5-0.14.el5.i386", "product_id": "condor-classads-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el5.i386", "product_id": "condor-kbdd-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-aviary-0:7.6.5-0.14.el5.i386", "product_id": "condor-aviary-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-qmf-0:7.6.5-0.14.el5.i386", "product_id": "condor-qmf-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "product_id": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "product_id": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-vm-gahp@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el5.i386", "product": { "name": "condor-0:7.6.5-0.14.el5.i386", "product_id": "condor-0:7.6.5-0.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-9.el5.i386", "product": { "name": "qpid-qmf-0:0.14-9.el5.i386", "product_id": "qpid-qmf-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-9.el5.i386", "product": { "name": "qpid-qmf-devel-0:0.14-9.el5.i386", "product_id": "qpid-qmf-devel-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "python-qpid-qmf-0:0.14-9.el5.i386", "product": { "name": "python-qpid-qmf-0:0.14-9.el5.i386", "product_id": "python-qpid-qmf-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-qmf@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "product": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "product_id": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-9.el5?arch=i386" } } }, { "category": "product_version", "name": "ruby-qpid-qmf-0:0.14-9.el5.i386", "product": { "name": "ruby-qpid-qmf-0:0.14-9.el5.i386", "product_id": "ruby-qpid-qmf-0:0.14-9.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-qpid-qmf@0.14-9.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.src as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src" }, "product_reference": "condor-0:7.6.5-0.14.el5.src", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386" }, "product_reference": "sesame-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.src as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src" }, "product_reference": "sesame-0:1.0-3.el5.src", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.i386 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64 as a component of MRG Grid for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.src as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src" }, "product_reference": "condor-0:7.6.5-0.14.el5.src", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.i386 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.i386", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64 as a component of MRG Grid Execute Node for RHEL 5 Server v.2", "product_id": "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.i386 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386" }, "product_reference": "sesame-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.src as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src" }, "product_reference": "sesame-0:1.0-3.el5.src", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.x86_64 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.i386 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64 as a component of MRG Management for RHEL 5 Server v.2", "product_id": "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.14-6.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch" }, "product_reference": "python-qpid-0:0.14-6.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-0:0.14-6.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src" }, "product_reference": "python-qpid-0:0.14-6.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386" }, "product_reference": "python-qpid-qmf-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-qmf-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64" }, "product_reference": "python-qpid-qmf-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-client-ssl-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-mrg-0:0.14-14.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src" }, "product_reference": "qpid-cpp-mrg-0:0.14-14.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-ssl-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-0:0.14-3.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src" }, "product_reference": "qpid-java-0:0.14-3.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-client-0:0.14-3.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch" }, "product_reference": "qpid-java-client-0:0.14-3.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-common-0:0.14-3.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch" }, "product_reference": "qpid-java-common-0:0.14-3.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-example-0:0.14-3.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch" }, "product_reference": "qpid-java-example-0:0.14-3.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch" }, "product_reference": "qpid-jca-0:0.14-9.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src" }, "product_reference": "qpid-jca-0:0.14-9.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-xarecovery-0:0.14-9.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch" }, "product_reference": "qpid-jca-xarecovery-0:0.14-9.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386" }, "product_reference": "qpid-qmf-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-9.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src" }, "product_reference": "qpid-qmf-0:0.14-9.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64" }, "product_reference": "qpid-qmf-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386" }, "product_reference": "qpid-qmf-devel-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tests-0:0.14-1.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch" }, "product_reference": "qpid-tests-0:0.14-1.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tests-0:0.14-1.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src" }, "product_reference": "qpid-tests-0:0.14-1.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.14-2.el5.noarch as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch" }, "product_reference": "qpid-tools-0:0.14-2.el5.noarch", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-tools-0:0.14-2.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src" }, "product_reference": "qpid-tools-0:0.14-2.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.14-9.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386" }, "product_reference": "ruby-qpid-qmf-0:0.14-9.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-qpid-qmf-0:0.14-9.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64" }, "product_reference": "ruby-qpid-qmf-0:0.14-9.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386" }, "product_reference": "sesame-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.src as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src" }, "product_reference": "sesame-0:1.0-3.el5.src", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-3.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.i386 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.i386", "relates_to_product_reference": "5Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-3.el5.x86_64 as a component of Red Hat MRG Messaging for RHEL 5 Server v.2", "product_id": "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-3.el5.x86_64", "relates_to_product_reference": "5Server-MRG-Messaging-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3620", "discovery_date": "2011-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747078" } ], "notes": [ { "category": "description", "text": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.", "title": "Vulnerability description" }, { "category": "summary", "text": "qpid-cpp: cluster authentication ignores cluster-* settings", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects the clustered implementation in qpid-cpp (qpidd-cpp-server-cluster) which is only available in Red Hat Enterprise MRG. The qpid-cpp-server as provided with Red Hat Enterprise Linux 6 does not include this functionality, and is thus not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src", "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3620" }, { "category": "external", "summary": "RHBZ#747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620" } ], "release_date": "2012-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-30T17:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src", "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0529" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Grid-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Grid-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.src", "5Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.i386", "5Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el5.x86_64", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Management-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Management-2:sesame-debuginfo-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.noarch", "5Server-MRG-Messaging-2:python-qpid-0:0.14-6.el5.src", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:python-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-client-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-mrg-0:0.14-14.el5.src", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-mrg-debuginfo-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-ssl-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.i386", "5Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el5.x86_64", "5Server-MRG-Messaging-2:qpid-java-0:0.14-3.el5.src", "5Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el5.noarch", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.src", "5Server-MRG-Messaging-2:qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.noarch", "5Server-MRG-Messaging-2:qpid-tests-0:0.14-1.el5.src", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.noarch", "5Server-MRG-Messaging-2:qpid-tools-0:0.14-2.el5.src", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.i386", "5Server-MRG-Messaging-2:ruby-qpid-qmf-0:0.14-9.el5.x86_64", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.src", "5Server-MRG-Messaging-2:sesame-0:1.0-3.el5.x86_64", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.i386", "5Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "qpid-cpp: cluster authentication ignores cluster-* settings" } ] }
rhsa-2012:0528
Vulnerability from csaf_redhat
Published
2012-04-30 17:40
Modified
2024-11-22 04:54
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update
Notes
Topic
Updated Messaging packages that resolve one security issue, fix multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2.1 for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.
It was found that Qpid accepted any password or SASL mechanism, provided
the remote user knew a valid cluster username. This could give a remote
attacker unauthorized access to the cluster, exposing cluster messages and
internal Qpid/MRG configurations. (CVE-2011-3620)
Note: If you are using an ACL, the cluster-username must be allowed to
publish to the qpid.cluster-credentials exchange. For example, if your
cluster-username is "foo", in your ACL file:
acl allow foo@QPID publish exchange name=qpid.cluster-credentials
The CVE-2011-3620 fix changes the cluster initialization protocol. As such,
the cluster with all new version brokers must be restarted for the changes
to take effect. Refer below for details.
These updated packages provide numerous enhancements and bug fixes for the
Messaging component of MRG. Space precludes documenting all of these
changes in this advisory. Documentation for these changes will be available
shortly in the Technical Notes document linked to in the References
section.
All users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are
advised to upgrade to these updated packages, which resolve the issues and
add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.
After installing the updated packages, stop the cluster by either running
"service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one
of the cluster nodes. Once stopped, restart the cluster with
"service qpidd start" on all nodes for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Messaging packages that resolve one security issue, fix multiple\nbugs, and add various enhancements are now available for Red Hat Enterprise\nMRG 2.1 for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Messaging is a high-speed reliable messaging distribution for Linux\nbased on AMQP (Advanced Message Queuing Protocol), an open protocol\nstandard for enterprise messaging that is designed to make mission critical\nmessaging widely available as a standard service, and to make enterprise\nmessaging interoperable across platforms, programming languages, and\nvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10\nclient libraries for C++, Java JMS, and Python; as well as persistence\nlibraries and management tools.\n\nIt was found that Qpid accepted any password or SASL mechanism, provided\nthe remote user knew a valid cluster username. This could give a remote\nattacker unauthorized access to the cluster, exposing cluster messages and\ninternal Qpid/MRG configurations. (CVE-2011-3620)\n\nNote: If you are using an ACL, the cluster-username must be allowed to\npublish to the qpid.cluster-credentials exchange. For example, if your\ncluster-username is \"foo\", in your ACL file:\n\nacl allow foo@QPID publish exchange name=qpid.cluster-credentials\n\nThe CVE-2011-3620 fix changes the cluster initialization protocol. As such,\nthe cluster with all new version brokers must be restarted for the changes\nto take effect. Refer below for details.\n\nThese updated packages provide numerous enhancements and bug fixes for the\nMessaging component of MRG. Space precludes documenting all of these\nchanges in this advisory. Documentation for these changes will be available\nshortly in the Technical Notes document linked to in the References\nsection.\n\nAll users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are\nadvised to upgrade to these updated packages, which resolve the issues and\nadd the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.\nAfter installing the updated packages, stop the cluster by either running\n\"service qpidd stop\" on all nodes, or \"qpid-cluster --all-stop\" on any one\nof the cluster nodes. Once stopped, restart the cluster with\n\"service qpidd start\" on all nodes for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0528", "url": "https://access.redhat.com/errata/RHSA-2012:0528" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0528", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0528" }, { "category": "external", "summary": "747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0528.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:54:58+00:00", "generator": { "date": "2024-11-22T04:54:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0528", "initial_release_date": "2012-04-30T17:40:00+00:00", "revision_history": [ { "date": "2012-04-30T17:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-04-30T17:48:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:54:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product": { "name": "Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:computenode:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Grid for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Management for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product": { "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:computenode:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "qpid-java-example-0:0.14-3.el6.noarch", "product": { "name": "qpid-java-example-0:0.14-3.el6.noarch", "product_id": "qpid-java-example-0:0.14-3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-example@0.14-3.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-client-0:0.14-3.el6.noarch", "product": { "name": "qpid-java-client-0:0.14-3.el6.noarch", "product_id": "qpid-java-client-0:0.14-3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-client@0.14-3.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-common-0:0.14-3.el6.noarch", "product": { "name": "qpid-java-common-0:0.14-3.el6.noarch", "product_id": "qpid-java-common-0:0.14-3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-common@0.14-3.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "product": { "name": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "product_id": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca-xarecovery@0.14-9.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el6.noarch", "product": { "name": "qpid-jca-0:0.14-9.el6.noarch", "product_id": "qpid-jca-0:0.14-9.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "product": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "product_id": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.14-14.el6_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qpid-java-0:0.14-3.el6.src", "product": { "name": "qpid-java-0:0.14-3.el6.src", "product_id": "qpid-java-0:0.14-3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java@0.14-3.el6?arch=src" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el6.src", "product": { "name": "qpid-jca-0:0.14-9.el6.src", "product_id": "qpid-jca-0:0.14-9.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el6?arch=src" } } }, { "category": "product_version", "name": "sesame-0:1.0-5.el6.src", "product": { "name": "sesame-0:1.0-5.el6.src", "product_id": "sesame-0:1.0-5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-5.el6?arch=src" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el6.src", "product": { "name": "condor-0:7.6.5-0.14.el6.src", "product_id": "condor-0:7.6.5-0.14.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el6?arch=src" } } }, { "category": "product_version", "name": "qpid-cpp-0:0.14-14.el6_2.src", "product": { "name": "qpid-cpp-0:0.14-14.el6_2.src", "product_id": "qpid-cpp-0:0.14-14.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp@0.14-14.el6_2?arch=src" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-7.el6_2.src", "product": { "name": "qpid-qmf-0:0.14-7.el6_2.src", "product_id": "qpid-qmf-0:0.14-7.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-7.el6_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "sesame-0:1.0-5.el6.i686", "product": { "name": "sesame-0:1.0-5.el6.i686", "product_id": "sesame-0:1.0-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-5.el6?arch=i686" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-5.el6.i686", "product": { "name": "sesame-debuginfo-0:1.0-5.el6.i686", "product_id": "sesame-debuginfo-0:1.0-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-5.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-classads-0:7.6.5-0.14.el6.i686", "product_id": "condor-classads-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686", "product_id": "condor-kbdd-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-plumage-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686", "product_id": "condor-plumage-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-plumage@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686", "product_id": "condor-aviary-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686", "product_id": "condor-qmf-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "product_id": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-0:7.6.5-0.14.el6.i686", "product_id": "condor-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "product": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "product_id": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-7.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "product": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "product_id": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-7.el6_2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "sesame-0:1.0-5.el6.x86_64", "product": { "name": "sesame-0:1.0-5.el6.x86_64", "product_id": "sesame-0:1.0-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-5.el6.x86_64", "product": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64", "product_id": "sesame-debuginfo-0:1.0-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-classads-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-plumage@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-vm-gahp@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "product": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "product_id": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-7.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "product": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "product_id": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-7.el6_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src" }, "product_reference": "condor-0:7.6.5-0.14.el6.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.src as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src" }, "product_reference": "condor-0:7.6.5-0.14.el6.src", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src" }, "product_reference": "condor-0:7.6.5-0.14.el6.src", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-0:0.14-14.el6_2.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src" }, "product_reference": "qpid-cpp-0:0.14-14.el6_2.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-0:0.14-3.el6.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src" }, "product_reference": "qpid-java-0:0.14-3.el6.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-client-0:0.14-3.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch" }, "product_reference": "qpid-java-client-0:0.14-3.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-common-0:0.14-3.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch" }, "product_reference": "qpid-java-common-0:0.14-3.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-example-0:0.14-3.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch" }, "product_reference": "qpid-java-example-0:0.14-3.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch" }, "product_reference": "qpid-jca-0:0.14-9.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el6.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src" }, "product_reference": "qpid-jca-0:0.14-9.el6.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-xarecovery-0:0.14-9.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch" }, "product_reference": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-7.el6_2.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src" }, "product_reference": "qpid-qmf-0:0.14-7.el6_2.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686" }, "product_reference": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3620", "discovery_date": "2011-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747078" } ], "notes": [ { "category": "description", "text": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.", "title": "Vulnerability description" }, { "category": "summary", "text": "qpid-cpp: cluster authentication ignores cluster-* settings", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects the clustered implementation in qpid-cpp (qpidd-cpp-server-cluster) which is only available in Red Hat Enterprise MRG. The qpid-cpp-server as provided with Red Hat Enterprise Linux 6 does not include this functionality, and is thus not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src", "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3620" }, { "category": "external", "summary": "RHBZ#747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620" } ], "release_date": "2012-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-30T17:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src", "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0528" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src", "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "qpid-cpp: cluster authentication ignores cluster-* settings" } ] }
rhsa-2012_0528
Vulnerability from csaf_redhat
Published
2012-04-30 17:40
Modified
2024-11-22 04:54
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update
Notes
Topic
Updated Messaging packages that resolve one security issue, fix multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2.1 for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.
It was found that Qpid accepted any password or SASL mechanism, provided
the remote user knew a valid cluster username. This could give a remote
attacker unauthorized access to the cluster, exposing cluster messages and
internal Qpid/MRG configurations. (CVE-2011-3620)
Note: If you are using an ACL, the cluster-username must be allowed to
publish to the qpid.cluster-credentials exchange. For example, if your
cluster-username is "foo", in your ACL file:
acl allow foo@QPID publish exchange name=qpid.cluster-credentials
The CVE-2011-3620 fix changes the cluster initialization protocol. As such,
the cluster with all new version brokers must be restarted for the changes
to take effect. Refer below for details.
These updated packages provide numerous enhancements and bug fixes for the
Messaging component of MRG. Space precludes documenting all of these
changes in this advisory. Documentation for these changes will be available
shortly in the Technical Notes document linked to in the References
section.
All users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are
advised to upgrade to these updated packages, which resolve the issues and
add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.
After installing the updated packages, stop the cluster by either running
"service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one
of the cluster nodes. Once stopped, restart the cluster with
"service qpidd start" on all nodes for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Messaging packages that resolve one security issue, fix multiple\nbugs, and add various enhancements are now available for Red Hat Enterprise\nMRG 2.1 for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Messaging is a high-speed reliable messaging distribution for Linux\nbased on AMQP (Advanced Message Queuing Protocol), an open protocol\nstandard for enterprise messaging that is designed to make mission critical\nmessaging widely available as a standard service, and to make enterprise\nmessaging interoperable across platforms, programming languages, and\nvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10\nclient libraries for C++, Java JMS, and Python; as well as persistence\nlibraries and management tools.\n\nIt was found that Qpid accepted any password or SASL mechanism, provided\nthe remote user knew a valid cluster username. This could give a remote\nattacker unauthorized access to the cluster, exposing cluster messages and\ninternal Qpid/MRG configurations. (CVE-2011-3620)\n\nNote: If you are using an ACL, the cluster-username must be allowed to\npublish to the qpid.cluster-credentials exchange. For example, if your\ncluster-username is \"foo\", in your ACL file:\n\nacl allow foo@QPID publish exchange name=qpid.cluster-credentials\n\nThe CVE-2011-3620 fix changes the cluster initialization protocol. As such,\nthe cluster with all new version brokers must be restarted for the changes\nto take effect. Refer below for details.\n\nThese updated packages provide numerous enhancements and bug fixes for the\nMessaging component of MRG. Space precludes documenting all of these\nchanges in this advisory. Documentation for these changes will be available\nshortly in the Technical Notes document linked to in the References\nsection.\n\nAll users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are\nadvised to upgrade to these updated packages, which resolve the issues and\nadd the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.\nAfter installing the updated packages, stop the cluster by either running\n\"service qpidd stop\" on all nodes, or \"qpid-cluster --all-stop\" on any one\nof the cluster nodes. Once stopped, restart the cluster with\n\"service qpidd start\" on all nodes for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0528", "url": "https://access.redhat.com/errata/RHSA-2012:0528" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0528", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0528" }, { "category": "external", "summary": "747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0528.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:54:58+00:00", "generator": { "date": "2024-11-22T04:54:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0528", "initial_release_date": "2012-04-30T17:40:00+00:00", "revision_history": [ { "date": "2012-04-30T17:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-04-30T17:48:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:54:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product": { "name": "Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:computenode:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Grid for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Management for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product": { "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:computenode:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "qpid-java-example-0:0.14-3.el6.noarch", "product": { "name": "qpid-java-example-0:0.14-3.el6.noarch", "product_id": "qpid-java-example-0:0.14-3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-example@0.14-3.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-client-0:0.14-3.el6.noarch", "product": { "name": "qpid-java-client-0:0.14-3.el6.noarch", "product_id": "qpid-java-client-0:0.14-3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-client@0.14-3.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-common-0:0.14-3.el6.noarch", "product": { "name": "qpid-java-common-0:0.14-3.el6.noarch", "product_id": "qpid-java-common-0:0.14-3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-common@0.14-3.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "product": { "name": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "product_id": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca-xarecovery@0.14-9.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el6.noarch", "product": { "name": "qpid-jca-0:0.14-9.el6.noarch", "product_id": "qpid-jca-0:0.14-9.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "product": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "product_id": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.14-14.el6_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qpid-java-0:0.14-3.el6.src", "product": { "name": "qpid-java-0:0.14-3.el6.src", "product_id": "qpid-java-0:0.14-3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java@0.14-3.el6?arch=src" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el6.src", "product": { "name": "qpid-jca-0:0.14-9.el6.src", "product_id": "qpid-jca-0:0.14-9.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el6?arch=src" } } }, { "category": "product_version", "name": "sesame-0:1.0-5.el6.src", "product": { "name": "sesame-0:1.0-5.el6.src", "product_id": "sesame-0:1.0-5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-5.el6?arch=src" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el6.src", "product": { "name": "condor-0:7.6.5-0.14.el6.src", "product_id": "condor-0:7.6.5-0.14.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el6?arch=src" } } }, { "category": "product_version", "name": "qpid-cpp-0:0.14-14.el6_2.src", "product": { "name": "qpid-cpp-0:0.14-14.el6_2.src", "product_id": "qpid-cpp-0:0.14-14.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp@0.14-14.el6_2?arch=src" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-7.el6_2.src", "product": { "name": "qpid-qmf-0:0.14-7.el6_2.src", "product_id": "qpid-qmf-0:0.14-7.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-7.el6_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "sesame-0:1.0-5.el6.i686", "product": { "name": "sesame-0:1.0-5.el6.i686", "product_id": "sesame-0:1.0-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-5.el6?arch=i686" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-5.el6.i686", "product": { "name": "sesame-debuginfo-0:1.0-5.el6.i686", "product_id": "sesame-debuginfo-0:1.0-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-5.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-classads-0:7.6.5-0.14.el6.i686", "product_id": "condor-classads-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686", "product_id": "condor-kbdd-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-plumage-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686", "product_id": "condor-plumage-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-plumage@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686", "product_id": "condor-aviary-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686", "product_id": "condor-qmf-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "product_id": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-0:7.6.5-0.14.el6.i686", "product_id": "condor-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "product": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "product_id": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-7.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "product": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "product_id": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-7.el6_2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "sesame-0:1.0-5.el6.x86_64", "product": { "name": "sesame-0:1.0-5.el6.x86_64", "product_id": "sesame-0:1.0-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-5.el6.x86_64", "product": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64", "product_id": "sesame-debuginfo-0:1.0-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-classads-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-plumage@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-vm-gahp@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "product": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "product_id": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-7.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "product": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "product_id": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-7.el6_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src" }, "product_reference": "condor-0:7.6.5-0.14.el6.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.src as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src" }, "product_reference": "condor-0:7.6.5-0.14.el6.src", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src" }, "product_reference": "condor-0:7.6.5-0.14.el6.src", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-0:0.14-14.el6_2.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src" }, "product_reference": "qpid-cpp-0:0.14-14.el6_2.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-0:0.14-3.el6.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src" }, "product_reference": "qpid-java-0:0.14-3.el6.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-client-0:0.14-3.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch" }, "product_reference": "qpid-java-client-0:0.14-3.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-common-0:0.14-3.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch" }, "product_reference": "qpid-java-common-0:0.14-3.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-example-0:0.14-3.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch" }, "product_reference": "qpid-java-example-0:0.14-3.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch" }, "product_reference": "qpid-jca-0:0.14-9.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el6.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src" }, "product_reference": "qpid-jca-0:0.14-9.el6.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-xarecovery-0:0.14-9.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch" }, "product_reference": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-7.el6_2.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src" }, "product_reference": "qpid-qmf-0:0.14-7.el6_2.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686" }, "product_reference": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3620", "discovery_date": "2011-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747078" } ], "notes": [ { "category": "description", "text": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.", "title": "Vulnerability description" }, { "category": "summary", "text": "qpid-cpp: cluster authentication ignores cluster-* settings", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects the clustered implementation in qpid-cpp (qpidd-cpp-server-cluster) which is only available in Red Hat Enterprise MRG. The qpid-cpp-server as provided with Red Hat Enterprise Linux 6 does not include this functionality, and is thus not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src", "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3620" }, { "category": "external", "summary": "RHBZ#747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620" } ], "release_date": "2012-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-30T17:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src", "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0528" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src", "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "qpid-cpp: cluster authentication ignores cluster-* settings" } ] }
RHSA-2012:0528
Vulnerability from csaf_redhat
Published
2012-04-30 17:40
Modified
2024-11-22 04:54
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update
Notes
Topic
Updated Messaging packages that resolve one security issue, fix multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2.1 for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Messaging is a high-speed reliable messaging distribution for Linux
based on AMQP (Advanced Message Queuing Protocol), an open protocol
standard for enterprise messaging that is designed to make mission critical
messaging widely available as a standard service, and to make enterprise
messaging interoperable across platforms, programming languages, and
vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10
client libraries for C++, Java JMS, and Python; as well as persistence
libraries and management tools.
It was found that Qpid accepted any password or SASL mechanism, provided
the remote user knew a valid cluster username. This could give a remote
attacker unauthorized access to the cluster, exposing cluster messages and
internal Qpid/MRG configurations. (CVE-2011-3620)
Note: If you are using an ACL, the cluster-username must be allowed to
publish to the qpid.cluster-credentials exchange. For example, if your
cluster-username is "foo", in your ACL file:
acl allow foo@QPID publish exchange name=qpid.cluster-credentials
The CVE-2011-3620 fix changes the cluster initialization protocol. As such,
the cluster with all new version brokers must be restarted for the changes
to take effect. Refer below for details.
These updated packages provide numerous enhancements and bug fixes for the
Messaging component of MRG. Space precludes documenting all of these
changes in this advisory. Documentation for these changes will be available
shortly in the Technical Notes document linked to in the References
section.
All users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are
advised to upgrade to these updated packages, which resolve the issues and
add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.
After installing the updated packages, stop the cluster by either running
"service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one
of the cluster nodes. Once stopped, restart the cluster with
"service qpidd start" on all nodes for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Messaging packages that resolve one security issue, fix multiple\nbugs, and add various enhancements are now available for Red Hat Enterprise\nMRG 2.1 for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Messaging is a high-speed reliable messaging distribution for Linux\nbased on AMQP (Advanced Message Queuing Protocol), an open protocol\nstandard for enterprise messaging that is designed to make mission critical\nmessaging widely available as a standard service, and to make enterprise\nmessaging interoperable across platforms, programming languages, and\nvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10\nclient libraries for C++, Java JMS, and Python; as well as persistence\nlibraries and management tools.\n\nIt was found that Qpid accepted any password or SASL mechanism, provided\nthe remote user knew a valid cluster username. This could give a remote\nattacker unauthorized access to the cluster, exposing cluster messages and\ninternal Qpid/MRG configurations. (CVE-2011-3620)\n\nNote: If you are using an ACL, the cluster-username must be allowed to\npublish to the qpid.cluster-credentials exchange. For example, if your\ncluster-username is \"foo\", in your ACL file:\n\nacl allow foo@QPID publish exchange name=qpid.cluster-credentials\n\nThe CVE-2011-3620 fix changes the cluster initialization protocol. As such,\nthe cluster with all new version brokers must be restarted for the changes\nto take effect. Refer below for details.\n\nThese updated packages provide numerous enhancements and bug fixes for the\nMessaging component of MRG. Space precludes documenting all of these\nchanges in this advisory. Documentation for these changes will be available\nshortly in the Technical Notes document linked to in the References\nsection.\n\nAll users of the Messaging capabilities of Red Hat Enterprise MRG 2.1 are\nadvised to upgrade to these updated packages, which resolve the issues and\nadd the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.\nAfter installing the updated packages, stop the cluster by either running\n\"service qpidd stop\" on all nodes, or \"qpid-cluster --all-stop\" on any one\nof the cluster nodes. Once stopped, restart the cluster with\n\"service qpidd start\" on all nodes for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0528", "url": "https://access.redhat.com/errata/RHSA-2012:0528" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0528", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html-single/Technical_Notes/index.html#RHSA-2012-0528" }, { "category": "external", "summary": "747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0528.json" } ], "title": "Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:54:58+00:00", "generator": { "date": "2024-11-22T04:54:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0528", "initial_release_date": "2012-04-30T17:40:00+00:00", "revision_history": [ { "date": "2012-04-30T17:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-04-30T17:48:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:54:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product": { "name": "Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:computenode:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Grid for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Management for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product": { "name": "Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:computenode:el6" } } }, { "category": "product_name", "name": "Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "qpid-java-example-0:0.14-3.el6.noarch", "product": { "name": "qpid-java-example-0:0.14-3.el6.noarch", "product_id": "qpid-java-example-0:0.14-3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-example@0.14-3.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-client-0:0.14-3.el6.noarch", "product": { "name": "qpid-java-client-0:0.14-3.el6.noarch", "product_id": "qpid-java-client-0:0.14-3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-client@0.14-3.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-java-common-0:0.14-3.el6.noarch", "product": { "name": "qpid-java-common-0:0.14-3.el6.noarch", "product_id": "qpid-java-common-0:0.14-3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java-common@0.14-3.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "product": { "name": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "product_id": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca-xarecovery@0.14-9.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el6.noarch", "product": { "name": "qpid-jca-0:0.14-9.el6.noarch", "product_id": "qpid-jca-0:0.14-9.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el6?arch=noarch" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "product": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "product_id": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel-docs@0.14-14.el6_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "qpid-java-0:0.14-3.el6.src", "product": { "name": "qpid-java-0:0.14-3.el6.src", "product_id": "qpid-java-0:0.14-3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-java@0.14-3.el6?arch=src" } } }, { "category": "product_version", "name": "qpid-jca-0:0.14-9.el6.src", "product": { "name": "qpid-jca-0:0.14-9.el6.src", "product_id": "qpid-jca-0:0.14-9.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-jca@0.14-9.el6?arch=src" } } }, { "category": "product_version", "name": "sesame-0:1.0-5.el6.src", "product": { "name": "sesame-0:1.0-5.el6.src", "product_id": "sesame-0:1.0-5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-5.el6?arch=src" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el6.src", "product": { "name": "condor-0:7.6.5-0.14.el6.src", "product_id": "condor-0:7.6.5-0.14.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el6?arch=src" } } }, { "category": "product_version", "name": "qpid-cpp-0:0.14-14.el6_2.src", "product": { "name": "qpid-cpp-0:0.14-14.el6_2.src", "product_id": "qpid-cpp-0:0.14-14.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp@0.14-14.el6_2?arch=src" } } }, { "category": "product_version", "name": "qpid-qmf-0:0.14-7.el6_2.src", "product": { "name": "qpid-qmf-0:0.14-7.el6_2.src", "product_id": "qpid-qmf-0:0.14-7.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf@0.14-7.el6_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "sesame-0:1.0-5.el6.i686", "product": { "name": "sesame-0:1.0-5.el6.i686", "product_id": "sesame-0:1.0-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-5.el6?arch=i686" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-5.el6.i686", "product": { "name": "sesame-debuginfo-0:1.0-5.el6.i686", "product_id": "sesame-debuginfo-0:1.0-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-5.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-classads-0:7.6.5-0.14.el6.i686", "product_id": "condor-classads-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686", "product_id": "condor-kbdd-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-plumage-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686", "product_id": "condor-plumage-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-plumage@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686", "product_id": "condor-aviary-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686", "product_id": "condor-qmf-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "product_id": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el6.i686", "product": { "name": "condor-0:7.6.5-0.14.el6.i686", "product_id": "condor-0:7.6.5-0.14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el6?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "product_id": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "product": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "product_id": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-7.el6_2?arch=i686" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "product": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "product_id": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-7.el6_2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "sesame-0:1.0-5.el6.x86_64", "product": { "name": "sesame-0:1.0-5.el6.x86_64", "product_id": "sesame-0:1.0-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame@1.0-5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "sesame-debuginfo-0:1.0-5.el6.x86_64", "product": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64", "product_id": "sesame-debuginfo-0:1.0-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sesame-debuginfo@1.0-5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-classads-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-classads-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-classads@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-kbdd@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-plumage@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-aviary@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-qmf@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-debuginfo@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor-vm-gahp@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "condor-0:7.6.5-0.14.el6.x86_64", "product": { "name": "condor-0:7.6.5-0.14.el6.x86_64", "product_id": "condor-0:7.6.5-0.14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/condor@7.6.5-0.14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-rdma@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-xml@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-cluster@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-client-devel@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-store@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-debuginfo@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-rdma@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "product": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "product_id": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-cpp-server-devel@0.14-14.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "product": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "product_id": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-debuginfo@0.14-7.el6_2?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "product": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "product_id": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-qmf-devel@0.14-7.el6_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src" }, "product_reference": "condor-0:7.6.5-0.14.el6.src", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 ComputeNode v.2", "product_id": "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.src as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src" }, "product_reference": "condor-0:7.6.5-0.14.el6.src", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Grid for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.src as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src" }, "product_reference": "condor-0:7.6.5-0.14.el6.src", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-aviary-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-aviary-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-classads-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-classads-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-kbdd-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-kbdd-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-plumage-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-plumage-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.i686 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.i686", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-qmf-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-qmf-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64 as a component of Red Hat MRG Grid Execute Node for RHEL 6 Server v.2", "product_id": "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64" }, "product_reference": "condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Grid-Execute-Node-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Management for RHEL 6 Server v.2", "product_id": "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Management-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-0:0.14-14.el6_2.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src" }, "product_reference": "qpid-cpp-0:0.14-14.el6_2.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch" }, "product_reference": "qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64" }, "product_reference": "qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-0:0.14-3.el6.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src" }, "product_reference": "qpid-java-0:0.14-3.el6.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-client-0:0.14-3.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch" }, "product_reference": "qpid-java-client-0:0.14-3.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-common-0:0.14-3.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch" }, "product_reference": "qpid-java-common-0:0.14-3.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-java-example-0:0.14-3.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch" }, "product_reference": "qpid-java-example-0:0.14-3.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch" }, "product_reference": "qpid-jca-0:0.14-9.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-0:0.14-9.el6.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src" }, "product_reference": "qpid-jca-0:0.14-9.el6.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-jca-xarecovery-0:0.14-9.el6.noarch as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch" }, "product_reference": "qpid-jca-xarecovery-0:0.14-9.el6.noarch", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-0:0.14-7.el6_2.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src" }, "product_reference": "qpid-qmf-0:0.14-7.el6_2.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64" }, "product_reference": "qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686" }, "product_reference": "qpid-qmf-devel-0:0.14-7.el6_2.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64" }, "product_reference": "qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686" }, "product_reference": "sesame-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.src as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src" }, "product_reference": "sesame-0:1.0-5.el6.src", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.i686 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.i686", "relates_to_product_reference": "6Server-MRG-Messaging-2" }, { "category": "default_component_of", "full_product_name": { "name": "sesame-debuginfo-0:1.0-5.el6.x86_64 as a component of Red Hat MRG Messaging for RHEL 6 Server v.2", "product_id": "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" }, "product_reference": "sesame-debuginfo-0:1.0-5.el6.x86_64", "relates_to_product_reference": "6Server-MRG-Messaging-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3620", "discovery_date": "2011-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747078" } ], "notes": [ { "category": "description", "text": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.", "title": "Vulnerability description" }, { "category": "summary", "text": "qpid-cpp: cluster authentication ignores cluster-* settings", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects the clustered implementation in qpid-cpp (qpidd-cpp-server-cluster) which is only available in Red Hat Enterprise MRG. The qpid-cpp-server as provided with Red Hat Enterprise Linux 6 does not include this functionality, and is thus not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src", "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3620" }, { "category": "external", "summary": "RHBZ#747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620" } ], "release_date": "2012-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-30T17:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src", "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0528" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.src", "6ComputeNode-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6ComputeNode-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Grid-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Grid-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.src", "6Server-MRG-Grid-Execute-Node-2:condor-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-aviary-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-classads-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-debuginfo-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-kbdd-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-plumage-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.i686", "6Server-MRG-Grid-Execute-Node-2:condor-qmf-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Grid-Execute-Node-2:condor-vm-gahp-0:7.6.5-0.14.el6.x86_64", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Management-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Management-2:sesame-debuginfo-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-0:0.14-14.el6_2.src", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-client-devel-docs-0:0.14-14.el6_2.noarch", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-client-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-debuginfo-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-cluster-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-devel-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-rdma-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-store-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.i686", "6Server-MRG-Messaging-2:qpid-cpp-server-xml-0:0.14-14.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-java-0:0.14-3.el6.src", "6Server-MRG-Messaging-2:qpid-java-client-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-common-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-java-example-0:0.14-3.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-jca-0:0.14-9.el6.src", "6Server-MRG-Messaging-2:qpid-jca-xarecovery-0:0.14-9.el6.noarch", "6Server-MRG-Messaging-2:qpid-qmf-0:0.14-7.el6_2.src", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-debuginfo-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.i686", "6Server-MRG-Messaging-2:qpid-qmf-devel-0:0.14-7.el6_2.x86_64", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.src", "6Server-MRG-Messaging-2:sesame-0:1.0-5.el6.x86_64", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.i686", "6Server-MRG-Messaging-2:sesame-debuginfo-0:1.0-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "qpid-cpp: cluster authentication ignores cluster-* settings" } ] }
fkie_cve-2011-3620
Vulnerability from fkie_nvd
Published
2012-05-03 23:55
Modified
2024-11-21 01:30
Severity ?
Summary
Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*", "matchCriteriaId": "C584B299-0BB9-4B4F-B0BC-11DE222F1F17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username." }, { "lang": "es", "value": "Apache Qpid v0.12 no verifica correctamente las credenciales durante la uni\u00f3n de un grupo, lo que permite a atacantes remotos obtener acceso a la funcionalidad de mensajer\u00eda y funcionalidad de trabajo de un grupo mediante el aprovechamiento de los conocimientos, nombre de usuario." } ], "id": "CVE-2011-3620", "lastModified": "2024-11-21T01:30:51.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-03T23:55:01.027", "references": [ { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/49000" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1026990" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "source": "secalert@redhat.com", "url": "https://issues.apache.org/jira/browse/QPID-3652" }, { "source": "secalert@redhat.com", "url": "https://reviews.apache.org/r/2988/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/QPID-3652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://reviews.apache.org/r/2988/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-3j5v-8288-v25g
Vulnerability from github
Published
2022-05-17 05:26
Modified
2022-05-17 05:26
Details
Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.
{ "affected": [], "aliases": [ "CVE-2011-3620" ], "database_specific": { "cwe_ids": [ "CWE-287" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-05-03T23:55:00Z", "severity": "HIGH" }, "details": "Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.", "id": "GHSA-3j5v-8288-v25g", "modified": "2022-05-17T05:26:06Z", "published": "2022-05-17T05:26:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3620" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/QPID-3652" }, { "type": "WEB", "url": "https://reviews.apache.org/r/2988" }, { "type": "WEB", "url": "http://secunia.com/advisories/49000" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1026990" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.