Name | CVE-2020-10684 |
Description | A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4950-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ansible (PTS) | bullseye | 2.10.7+merged+base+2.10.17+dfsg-0+deb11u1 | fixed |
bookworm | 7.7.0+dfsg-3+deb12u1 | fixed | |
sid, trixie | 10.6.0+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ansible | source | stretch | (unfixed) | end-of-life | ||
ansible | source | buster | 2.7.7+dfsg-1+deb10u1 | DSA-4950-1 | ||
ansible | source | (unstable) | 2.9.7+dfsg-1 |
[stretch] - ansible <end-of-life> (EOL'd for stretch)
https://bugzilla.redhat.com/show_bug.cgi?id=1815519
https://github.com/ansible/ansible/pull/68431
https://github.com/ansible/ansible/commit/a9d2ceafe429171c0e2ad007058b88bae57c74ce