Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 540260 (CVE-2015-1426) - <dev-ruby/facter-2.4.1: potential sensitive information leakage in Facter's Amazon EC2 metadata facts handling (CVE-2015-1426)
Summary: <dev-ruby/facter-2.4.1: potential sensitive information leakage in Facter's A...
Status: RESOLVED FIXED
Alias: CVE-2015-1426
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-02-16 08:05 UTC by Agostino Sarubbo
Modified: 2015-04-12 22:37 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-02-16 08:05:28 UTC
From ${URL} :

An issue exists where sensitive Amazon EC2 IAM instance metadata could be added to an Amazon EC2 
node's facts, where a non-privileged local user could access the information via Facter.

Although Amazon’s API allows anyone who can access an EC2 instance to view its instance metadata, 
facts containing sensitive EC2 instance metadata could be unintentionally exposed through off-host 
applications that display facts.

Upstream commit that fixes this:
https://github.com/puppetlabs/facter/commit/e546bc546e7fb23ad6b68fcf2059452df4d320dd

External References:

http://puppetlabs.com/security/cve/cve-2015-1426


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2015-02-16 20:36:35 UTC
2.4.1 was already added to the tree.  We do have a problem where the ebuild has ruby 2.1 support but it's not stable.  Should we revbump it and remove ruby21 so we can stablize it?  Here are the arches we will need stable for.

amd64 hppa ppc ppc64 sparc x86
Comment 2 Hans de Graaff gentoo-dev Security 2015-02-17 06:57:58 UTC
This version of facter can now be marked stable:

=facter-2.4.1
Comment 3 Hans de Graaff gentoo-dev Security 2015-02-17 06:58:30 UTC
That should obviously be:

=dev-ruby/facter-2.4.1
Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2015-02-17 08:44:06 UTC
Stable for HPPA.
Comment 5 Agostino Sarubbo gentoo-dev 2015-02-18 08:53:34 UTC
ppc64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2015-02-18 09:19:00 UTC
ppc stable
Comment 7 Agostino Sarubbo gentoo-dev 2015-02-19 10:41:48 UTC
amd64 stable
Comment 8 Agostino Sarubbo gentoo-dev 2015-02-23 10:57:47 UTC
sparc stable
Comment 9 Agostino Sarubbo gentoo-dev 2015-02-23 10:58:01 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 10 Hans de Graaff gentoo-dev Security 2015-02-23 18:53:51 UTC
Vulnerable versions have been removed.
Comment 11 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2015-03-11 06:15:13 UTC
removing self as badness is gone
Comment 12 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-03-18 22:03:21 UTC
GLSA Vote: No
Comment 13 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2015-03-18 22:04:36 UTC
GLSA vote: no.

Closing as [noglsa]
Comment 14 GLSAMaker/CVETool Bot gentoo-dev 2015-04-12 22:37:25 UTC
CVE-2015-1426 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1426):
  Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to obtains
  sensitive Amazon EC2 IAM instance metadata by reading a fact for an Amazon
  EC2 node.