A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4950-1 | ansible security update |
EUVD |
EUVD-2021-0005 | A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6. |
Github GHSA |
GHSA-r6h7-5pq2-j77h | Insufficiently random values in Ansible |
Ubuntu USN |
USN-7330-1 | Ansible vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.897Z
Reserved: 2020-03-20T00:00:00
Link: CVE-2020-10729
No data.
Status : Modified
Published: 2021-05-27T19:15:07.880
Modified: 2024-11-21T04:55:56.860
Link: CVE-2020-10729
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA
Ubuntu USN