An issue exists where sensitive Amazon EC2 IAM instance metadata could be added to an Amazon EC2 node's facts, where a non-privileged local user could access the information via Facter. Although Amazon’s API allows anyone who can access an EC2 instance to view its instance metadata, facts containing sensitive EC2 instance metadata could be unintentionally exposed through off-host applications that display facts. Upstream commit that fixes this: https://github.com/puppetlabs/facter/commit/e546bc546e7fb23ad6b68fcf2059452df4d320dd External References: http://puppetlabs.com/security/cve/cve-2015-1426
Created facter tracking bugs for this issue: Affects: fedora-all [bug 1191555] Affects: epel-all [bug 1191556]
This only affects products using puppet/facter to directly interact with Amazon EC2 instances.
Statement: This issue did not affect the versions of facter as shipped with various Red Hat products as they do not use puppet and facter to control Amazon EC2 instances directly.