Bug 1399220 (CVE-2016-9639) - CVE-2016-9639 salt: Vulnerable caching provides access to private pillar data
Summary: CVE-2016-9639 salt: Vulnerable caching provides access to private pillar data
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2016-9639
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1399223
Blocks: 1399225
TreeView+ depends on / blocked
 
Reported: 2016-11-28 15:06 UTC by Andrej Nemec
Modified: 2020-11-25 13:41 UTC (History)
7 users (show)

Fixed In Version: salt 2015.8.11
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-12-15 03:57:13 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2016-11-28 15:06:14 UTC
Salt minions (clients), come with a descriptive id and a crypto key
each. Attaching a minion to a master (server) boils down to "accepting
its key" with a command on the master.

Now it can happen that after one minion is fully accepted, a second one
presents itself to the master with the same id but different key. In
that case, Salt will figure out that the key is different and reject the
second minion, assuming it is an impostor.

Due to Salt's caching mechanisms, I found out that under certain
circumstances Salt commands can reach, read data from and write data to,
both minions ("original" and "impostor"). That includes pillar data,
which is supposed to be secret to a certain minion.

References:

http://seclists.org/oss-sec/2016/q4/526

Comment 1 Andrej Nemec 2016-11-28 15:09:30 UTC
Fedora 25, package salt, is not vulnerable because it currently has salt-2016.3.3-3.fc25 in stable

Comment 2 Andrej Nemec 2016-11-28 15:09:48 UTC
Created salt tracking bugs for this issue:

Affects: epel-all [bug 1399223]


Note You need to log in before you can comment on or make changes to this bug.