CVE-2026-31392
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/04/2026
Last modified:
03/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
smb: client: fix krb5 mount with username option<br />
<br />
Customer reported that some of their krb5 mounts were failing against<br />
a single server as the client was trying to mount the shares with<br />
wrong credentials. It turned out the client was reusing SMB session<br />
from first mount to try mounting the other shares, even though a<br />
different username= option had been specified to the other mounts.<br />
<br />
By using username mount option along with sec=krb5 to search for<br />
principals from keytab is supported by cifs.upcall(8) since<br />
cifs-utils-4.8. So fix this by matching username mount option in<br />
match_session() even with Kerberos.<br />
<br />
For example, the second mount below should fail with -ENOKEY as there<br />
is no &#39;foobar&#39; principal in keytab (/etc/krb5.keytab). The client<br />
ends up reusing SMB session from first mount to perform the second<br />
one, which is wrong.<br />
<br />
```<br />
$ ktutil<br />
ktutil: add_entry -password -p testuser -k 1 -e aes256-cts<br />
Password for testuser@ZELDA.TEST:<br />
ktutil: write_kt /etc/krb5.keytab<br />
ktutil: quit<br />
$ klist -ke<br />
Keytab name: FILE:/etc/krb5.keytab<br />
KVNO Principal<br />
---- ----------------------------------------------------------------<br />
1 testuser@ZELDA.TEST (aes256-cts-hmac-sha1-96)<br />
$ mount.cifs //w22-root2/scratch /mnt/1 -o sec=krb5,username=testuser<br />
$ mount.cifs //w22-root2/scratch /mnt/2 -o sec=krb5,username=foobar<br />
$ mount -t cifs | grep -Po &#39;username=\K\w+&#39;<br />
testuser<br />
testuser<br />
```
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/12b4c5d98cd7ca46d5035a57bcd995df614c14e1
- https://git.kernel.org/stable/c/6e9ff1eb7feedcf46ff2d0503759960ab58e7775
- https://git.kernel.org/stable/c/9229709ec8bf85ae7ca53aeee9aa14814cdc1bd2
- https://git.kernel.org/stable/c/9ee803bfdba0cf739038dbdabdd4c02582c8f2b2
- https://git.kernel.org/stable/c/d33cbf0bf8979d779900da9be2505d68d9d8da25
- https://git.kernel.org/stable/c/fd4547830720647d4af02ee50f883c4b1cca06e4



