CVE-2016-8614:
Ansible apt_key module does not properly verify key fingerprint
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.27535%
CWE
Published
10/10/2018
Updated
9/3/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ansible | pip | >= 0, < 2.2.0.0 | 2.2.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper handling of key IDs in the apt_key module. The commit diff shows a reversal of return values from parse_key_id in the main function. Originally, key_id was set to the first return value (short_key_id), leading to verification based on insecure short IDs. The patch corrected this by assigning key_id to the full fingerprint value. The main function's incorrect variable assignment prior to the patch directly caused the security check bypass.