From 6e2acebc778ee8507b1631968c78459e30a4163e Mon Sep 17 00:00:00 2001 From: Jeremy Allison Date: Wed, 7 Jan 1998 08:29:15 +0000 Subject: Ensure that if we are in share mode security that the smb_uid field is invalid. Jeremy. (This used to be commit a689ca1ce5c3ffdc753dce329f51a8ede0592f29) --- source3/smbd/server.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'source3/smbd') diff --git a/source3/smbd/server.c b/source3/smbd/server.c index 5eb360bbe7..93d2a9756d 100644 --- a/source3/smbd/server.c +++ b/source3/smbd/server.c @@ -4670,7 +4670,8 @@ static int switch_message(int type,char *inbuf,char *outbuf,int size,int bufsize { int cnum = SVAL(inbuf,smb_tid); int flags = smb_messages[match].flags; - uint16 session_tag = SVAL(inbuf,smb_uid); + /* In share mode security we must ignore the vuid. */ + uint16 session_tag = (lp_security() == SEC_SHARE) ? UID_FIELD_INVALID : SVAL(inbuf,smb_uid); /* does this protocol need to be run as root? */ if (!(flags & AS_USER)) -- cgit