CVE-2020-25717: s4:smb_server: start with authoritative = 1
authorStefan Metzmacher <metze@samba.org>
Tue, 26 Oct 2021 15:42:41 +0000 (17:42 +0200)
committerPavel Filipenský <pfilipensky@samba.org>
Wed, 18 Jan 2023 12:00:51 +0000 (13:00 +0100)
This is not strictly needed, but makes it easier to audit
that we don't miss important places.

BUG: https://bugzilla.samba.org/show_bug.cgi?id=14556

Signed-off-by: Stefan Metzmacher <metze@samba.org>
source4/smb_server/smb/sesssetup.c

index 13f139344120e4bf602d6e313645e225ddcb51e7..5e817eecd4b6119b5a091d148bd2dd4ed53de689 100644 (file)
@@ -102,7 +102,7 @@ static void sesssetup_old_send(struct tevent_req *subreq)
        struct auth_session_info *session_info;
        struct smbsrv_session *smb_sess;
        NTSTATUS status;
-       uint8_t authoritative = 0;
+       uint8_t authoritative = 1;
        uint32_t flags;
 
        status = auth_check_password_recv(subreq, req, &user_info_dc,
@@ -243,7 +243,7 @@ static void sesssetup_nt1_send(struct tevent_req *subreq)
        struct auth_user_info_dc *user_info_dc = NULL;
        struct auth_session_info *session_info;
        struct smbsrv_session *smb_sess;
-       uint8_t authoritative = 0;
+       uint8_t authoritative = 1;
        uint32_t flags;
        NTSTATUS status;