Show plain JSON{"acknowledgement": "This issue was discovered by Aaron Weitekamp (Red Hat Cloud Quality Engineering team).", "affected_release": [{"advisory": "RHSA-2013:0547", "cpe": "cpe:/a:cloudforms_systemengine:1::el6", "package": "candlepin-0:0.7.19-3.el6cf", "product_name": "CloudForms for RHEL 6", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0547", "cpe": "cpe:/a:cloudforms_systemengine:1::el6", "package": "katello-0:1.1.12.2-5.el6cf", "product_name": "CloudForms for RHEL 6", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0547", "cpe": "cpe:/a:cloudforms_systemengine:1::el6", "package": "katello-cli-0:1.1.8-14.el6cf", "product_name": "CloudForms for RHEL 6", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0547", "cpe": "cpe:/a:cloudforms_systemengine:1::el6", "package": "katello-configure-0:1.1.9-13.el6cf", "product_name": "CloudForms for RHEL 6", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0547", "cpe": "cpe:/a:cloudforms_systemengine:1::el6", "package": "katello-selinux-0:1.1.1-5.el6cf", "product_name": "CloudForms for RHEL 6", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "apache-commons-codec-0:1.7-2.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "candlepin-0:0.7.23-1.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "elasticsearch-0:0.19.9-5.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "katello-0:1.2.1-15h.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "katello-certs-tools-0:1.2.1-1h.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "katello-cli-0:1.2.1-12h.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "katello-configure-0:1.2.3-3h.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "katello-selinux-0:1.2.1-2h.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "lucene3-0:3.6.1-10h.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "puppet-0:2.6.17-2.el6cf", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "quartz-0:2.1.5-4.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "rubygem-activesupport-1:3.0.10-10.el6cf", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "rubygem-apipie-rails-0:0.0.12-2.el6cf", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "rubygem-ldap_fluff-0:0.1.3-1.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "rubygem-mail-0:2.3.0-3.el6cf", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "rubygem-rack-1:1.3.0-3.el6cf", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "rubygem-ruby_parser-0:2.0.4-6.el6cf", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "sigar-0:1.6.5-0.12.git58097d9h.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "snappy-java-0:1.0.4-2.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}, {"advisory": "RHSA-2013:0544", "cpe": "cpe:/a:rhel_sam:1.2::el6", "package": "thumbslug-0:0.0.28-1.el6_3", "product_name": "Red Hat Subscription Asset Manager 1.2", "release_date": "2013-02-21T00:00:00Z"}], "bugzilla": {"description": "Katello: /etc/katello/secure/passphrase is world readable", "id": "879094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879094"}, "csaw": false, "cvss": {"cvss_base_score": "2.1", "cvss_scoring_vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "status": "verified"}, "details": ["script/katello-generate-passphrase in Katello 1.1 uses world-readable permissions for /etc/katello/secure/passphrase, which allows local users to obtain the passphrase by reading the file."], "name": "CVE-2012-5561", "public_date": "2013-01-03T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2012-5561\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-5561"], "threat_severity": "Moderate"}