DescriptionA flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|HPE Helion OpenStack 8||ansible||Won't fix|
|HPE Helion OpenStack 8||ansible1||Won't fix|
|SUSE Linux Enterprise Server 11 SP3||ansible||Won't fix|
|SUSE Manager Client Tools Beta for SLE 15||ansible||Won't fix|
|SUSE Manager Client Tools for SLE 15||ansible||Won't fix|
|SUSE Manager Proxy Module 4.2||ansible||Won't fix|
|SUSE Manager Proxy Module 4.3||ansible||Won't fix|
|SUSE OpenStack Cloud 7||ansible||Unsupported|
|SUSE OpenStack Cloud 8||ansible||Won't fix|
|SUSE OpenStack Cloud 8||ansible1||Won't fix|
|SUSE OpenStack Cloud 9||ansible1||Won't fix|
|SUSE OpenStack Cloud Crowbar 8||ansible||Won't fix|
SUSE Timeline for this CVECVE page created: Wed Aug 4 10:01:43 2021
CVE page last modified: Mon Nov 7 17:46:27 2022