Description
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4950-1 | ansible security update |
EUVD |
EUVD-2021-0005 | A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6. |
Github GHSA |
GHSA-r6h7-5pq2-j77h | Insufficiently random values in Ansible |
Ubuntu USN |
USN-7330-1 | Ansible vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.897Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10729
No data.
Status : Modified
Published: 2021-05-27T19:15:07.880
Modified: 2024-11-21T04:55:56.860
Link: CVE-2020-10729
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Github GHSA
Ubuntu USN