Fix #42 by only applying mitigation on vulnerable Samba versions

This commit is contained in:
Bert Van Vreckem 2019-06-22 17:47:29 +02:00
parent 37a8bb43bc
commit c01efd669e
3 changed files with 17 additions and 4 deletions

View File

@ -19,9 +19,11 @@ The following are not considered concerns of this role, and you should configure
## CVE-2017-7494 ## CVE-2017-7494
A recently discovered remote code execution vulnerability may affect your Samba server installation. If SELinux is enabled on your system, it is **NOT** vulnerable. Version 2.3.1 of this role has a fix for the vulnerability. Upgrade your system if necessary. A remote code execution vulnerability may affect your Samba server installation. Samba versions 3.5.0 and before 4.6.4 are affected. If SELinux is enabled on your system, it is **NOT** vulnerable.
You can disable the fix if necessary, by setting the role variable `samba_mitigate_cve_2017_7494` to `false`. This role will check if the installed version of Samba is affected by the vulnerability and apply the proposed workaround: adding `nt pipe support = no` to the `[global]` section of the configuration. Remark that this disables share browsing by Windows clients.
You can explicitly disable the fix if necessary, by setting the role variable `samba_mitigate_cve_2017_7494` to `false`.
More info: <https://access.redhat.com/security/cve/cve-2017-7494> More info: <https://access.redhat.com/security/cve/cve-2017-7494>

View File

@ -23,6 +23,17 @@
when: samba_vfs_packages is defined when: samba_vfs_packages is defined
tags: samba tags: samba
- name: Register Samba version
shell: "smbd --version | sed 's/Version //'"
register: samba_version
changed_when: false
tags: samba
# - name: "Installed Samba version:"
# debug:
# msg: "{{ samba_version }}"
# tags: samba
- name: Install SELinux package - name: Install SELinux package
package: package:
name: "{{ item }}" name: "{{ item }}"

View File

@ -72,8 +72,8 @@
{% endif %} {% endif %}
{% endif %} {% endif %}
{% if samba_mitigate_cve_2017_7494 %} {% if samba_mitigate_cve_2017_7494 and samba_version.stdout >= "3.5.0" and samba_version.stdout < "4.6.4" %}
# Fix for CVE-2017-7494 # Fix for CVE-2017-7494 in Samba versions from 3.5.0 and before 4.6.4
# https://access.redhat.com/security/cve/cve-2017-7494 # https://access.redhat.com/security/cve/cve-2017-7494
nt pipe support = no nt pipe support = no
{% endif %} {% endif %}