Description
In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix dir separator in SMB1 UNIX mounts

When calling cifs_mount_get_tcon() with SMB1 UNIX mounts,
@cifs_sb->mnt_cifs_flags needs to be read or updated only after
calling reset_cifs_unix_caps(), otherwise it might end up with missing
CIFS_MOUNT_POSIXACL and CIFS_MOUNT_POSIX_PATHS bits.

This fixes the wrong dir separator used in paths caused by the missing
CIFS_MOUNT_POSIX_PATHS bit in cifs_sb_info::mnt_cifs_flags.
Published: 2026-05-01
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw lies in the Linux kernel’s CIFS client when handling SMB1 UNIX mounts. During the mount process, the cifs_mount_get_tcon() function may read or update the CIFS_MOUNT_POSIXACL and CIFS_MOUNT_POSIX_PATHS bits only after reset_cifs_unix_caps(), causing the CIFS_MOUNT_POSIX_PATHS flag to be missing. This omission leads to the use of an incorrect directory separator in paths. The weakness is a pathname handling problem (CWE‑22) and does not grant unauthorized file access, privilege escalation, or code execution. Its effect is limited to incorrect path resolution on mounted shares, which can affect functionality rather than security posture.

Affected Systems

All Linux kernel releases before the patch containing the dir separator fix are affected. The issue resides in the CIFS SMB client component used by distributions that mount SMB shares using the CIFS helper. Any Linux system that relies on the unpatched kernel for SMB1 support is potentially impacted.

Risk and Exploitability

No EPSS score is available and the vulnerability is not listed in CISA’s KEV catalog, indicating a low likelihood of exploitation. There are no reported exploits. The bug manifests during client-initiated SMB mount operations, so a remote attacker could not exploit it without first mounting the share locally or having the affected client performed the mount. The flaw does not provide a direct vector for code execution or data exfiltration, and so the overall risk is low to moderate.

Generated by OpenCVE AI on May 2, 2026 at 12:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the SMB1 directory separator fix.
  • If SMB1 is required, consider disabling it and using SMB2 or SMB3 protocols to avoid the flaw.
  • Verify that CIFS_MOUNT_POSIXACL and CIFS_MOUNT_POSIX_PATHS flags are correctly set on shares and test typical operations to ensure correct directory resolution.

Generated by OpenCVE AI on May 2, 2026 at 12:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 00:15:00 +0000


Fri, 01 May 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: smb: client: fix dir separator in SMB1 UNIX mounts When calling cifs_mount_get_tcon() with SMB1 UNIX mounts, @cifs_sb->mnt_cifs_flags needs to be read or updated only after calling reset_cifs_unix_caps(), otherwise it might end up with missing CIFS_MOUNT_POSIXACL and CIFS_MOUNT_POSIX_PATHS bits. This fixes the wrong dir separator used in paths caused by the missing CIFS_MOUNT_POSIX_PATHS bit in cifs_sb_info::mnt_cifs_flags.
Title smb: client: fix dir separator in SMB1 UNIX mounts
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T13:56:07.217Z

Reserved: 2026-03-09T15:48:24.133Z

Link: CVE-2026-31710

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T14:16:21.040

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31710

cve-icon Redhat

Severity :

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31710 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T12:15:25Z

Weaknesses