Skip to navigation

Bug Fix Advisory qpid-tests bug fix update

Advisory: RHBA-2011:0802-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-19
Last updated on: 2011-05-19
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated qpid-tests package that fixes a bug is now available.

The qpid-tests package contains conformance tests for Apache Qpid.

The qpid-tests package has been upgraded to upstream version 0.10, which
provides numerous improvements over the previous version. (BZ#675824)

All users of qpid-tests are advised to upgrade to this updated package, which
resolves this issue.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
qpid-tests-0.10-1.el6.src.rpm
File outdated by:  RHEA-2012:0530
    MD5: 1ee097f37a129a8425200cb49405cf96
SHA-256: be92f2b991875dfdcd5b033db9c3a397a85cfe4186d0081c3765129099ebe11b
 
IA-32:
qpid-tests-0.10-1.el6.noarch.rpm
File outdated by:  RHEA-2012:0530
    MD5: 37a096bed3be503203ba7bca4cfcf4ee
SHA-256: 1764627f0d7b0e0fd0277fb408d03671643e44141729ed3bdaa6ac2422e1e7cf
 
x86_64:
qpid-tests-0.10-1.el6.noarch.rpm
File outdated by:  RHEA-2012:0530
    MD5: 37a096bed3be503203ba7bca4cfcf4ee
SHA-256: 1764627f0d7b0e0fd0277fb408d03671643e44141729ed3bdaa6ac2422e1e7cf
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
qpid-tests-0.10-1.el6.src.rpm
File outdated by:  RHEA-2012:0530
    MD5: 1ee097f37a129a8425200cb49405cf96
SHA-256: be92f2b991875dfdcd5b033db9c3a397a85cfe4186d0081c3765129099ebe11b
 
IA-32:
qpid-tests-0.10-1.el6.noarch.rpm
File outdated by:  RHEA-2012:0530
    MD5: 37a096bed3be503203ba7bca4cfcf4ee
SHA-256: 1764627f0d7b0e0fd0277fb408d03671643e44141729ed3bdaa6ac2422e1e7cf
 
x86_64:
qpid-tests-0.10-1.el6.noarch.rpm
File outdated by:  RHEA-2012:0530
    MD5: 37a096bed3be503203ba7bca4cfcf4ee
SHA-256: 1764627f0d7b0e0fd0277fb408d03671643e44141729ed3bdaa6ac2422e1e7cf
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
qpid-tests-0.10-1.el6.src.rpm
File outdated by:  RHEA-2012:0530
    MD5: 1ee097f37a129a8425200cb49405cf96
SHA-256: be92f2b991875dfdcd5b033db9c3a397a85cfe4186d0081c3765129099ebe11b
 
IA-32:
qpid-tests-0.10-1.el6.noarch.rpm
File outdated by:  RHEA-2012:0530
    MD5: 37a096bed3be503203ba7bca4cfcf4ee
SHA-256: 1764627f0d7b0e0fd0277fb408d03671643e44141729ed3bdaa6ac2422e1e7cf
 
x86_64:
qpid-tests-0.10-1.el6.noarch.rpm
File outdated by:  RHEA-2012:0530
    MD5: 37a096bed3be503203ba7bca4cfcf4ee
SHA-256: 1764627f0d7b0e0fd0277fb408d03671643e44141729ed3bdaa6ac2422e1e7cf
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

675824 - Rebase qpid-tests to 0.10 for snapshot 3



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/