A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-4950-1 | ansible security update |
![]() |
EUVD-2021-0005 | A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6. |
![]() |
GHSA-r6h7-5pq2-j77h | Insufficiently random values in Ansible |
![]() |
USN-7330-1 | Ansible vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.897Z
Reserved: 2020-03-20T00:00:00
Link: CVE-2020-10729

No data.

Status : Modified
Published: 2021-05-27T19:15:07.880
Modified: 2024-11-21T04:55:56.860
Link: CVE-2020-10729


No data.