Performing verification for jammy: We are going to perform a series of mounts and check if they work with a patched vs unpatched kernel, and make sure all mounts work.
We will start with an unpatched kernel: ubuntu@jammy-dc:~$ uname -rv 5.15.0-141-generic #151-Ubuntu SMP Sun May 18 21:35:19 UTC 2025 I installed cifs-utils 2:6.14-1ubuntu0.2 from -updates. Let's try and standard uid 1000 user: ubuntu@jammy-dc:~$ kinit [email protected] Password for [email protected]: Warning: Your password will expire in 38 days on Fri Jul 25 02:42:43 2025 ubuntu@jammy-dc:~$ klist Ticket cache: FILE:/tmp/krb5cc_1000 Default principal: [email protected] Valid starting Expires Service principal 06/16/25 04:39:52 06/16/25 14:39:52 krbtgt/[email protected] renew until 06/17/25 04:39:49 ubuntu@jammy-dc:~$ sudo mount -t cifs -o cruid=ubuntu,user=ubuntu,sec=krb5i,uid=1000,gid=1000,cred=/tmp/krb5cc_1000 //samba-dc.example.com/demo /mnt/testshare1 ubuntu@jammy-dc:~$ mount -l | grep cifs //samba-dc.example.com/demo on /mnt/testshare1 type cifs (rw,relatime,vers=3.1.1,sec=krb5i,cruid=1000,cache=strict,username=ubuntu,uid=1000,forceuid,gid=1000,forcegid,addr=192.168.122.79,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=4194304,wsize=4194304,bsize=1048576,echo_interval=60,actimeo=1,closetimeo=1,user=ubuntu) $ journalctl -b0 kernel: CIFS: enabling forceuid mount option implicitly because uid= option is specified kernel: CIFS: enabling forcegid mount option implicitly because gid= option is specified kernel: CIFS: Attempting to mount \\samba-dc.example.com\demo cifs.upcall[1661]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=samba-dc.example.com;ip4=192.168.122.79;sec=krb5;uid=0x3e8;creduid=0x3e8;user=ubuntu;pid=0x665 cifs.upcall[1662]: ver=2 cifs.upcall[1662]: host=samba-dc.example.com cifs.upcall[1662]: ip=192.168.122.79 cifs.upcall[1662]: sec=1 cifs.upcall[1662]: uid=1000 cifs.upcall[1662]: creduid=1000 cifs.upcall[1662]: user=ubuntu cifs.upcall[1662]: pid=1637 cifs.upcall[1661]: upcall_target=app, switching namespaces to application thread cifs.upcall[1661]: get_cachename_from_process_env: pid == 0 cifs.upcall[1661]: get_existing_cc: default ccache is FILE:/tmp/krb5cc_1000 cifs.upcall[1661]: handle_krb5_mech: getting service ticket for samba-dc.example.com cifs.upcall[1661]: handle_krb5_mech: obtained service ticket cifs.upcall[1661]: Exit status 0 Let's try as a different uid user, e.g. like AD user: ubuntu@jammy-dc:~$ mv /tmp/krb5cc_1000 /tmp/krb5cc_11200 ubuntu@jammy-dc:~$ export KRB5CCNAME=/tmp/krb5cc_11200 ubuntu@jammy-dc:~$ klist /tmp/krb5cc_11200 Ticket cache: FILE:/tmp/krb5cc_11200 Default principal: [email protected] Valid starting Expires Service principal 06/16/25 04:39:52 06/16/25 14:39:52 krbtgt/[email protected] renew until 06/17/25 04:39:49 06/16/25 04:40:02 06/16/25 14:39:52 cifs/samba-dc.example.com@ renew until 06/17/25 04:39:49 Ticket server: cifs/[email protected] ubuntu@jammy-dc:~$ sudo mount -t cifs -o sec=krb5i //samba-dc.example.com/demo /mnt/testshare1 mount error(126): Required key not available Refer to the mount.cifs(8) manual page (e.g. man mount.cifs) and kernel log messages (dmesg) ubuntu@jammy-dc:~$ mount -l | grep cifs $ journalctl -b0 kernel: CIFS: Attempting to mount \\samba-dc.example.com\demo cifs.upcall[1687]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=samba-dc.example.com;ip4=192.168.122.79;sec=krb5;uid=0x0;creduid=0x3e8;user=root;pid=0x68a cifs.upcall[1688]: ver=2 cifs.upcall[1688]: host=samba-dc.example.com cifs.upcall[1688]: ip=192.168.122.79 cifs.upcall[1688]: sec=1 cifs.upcall[1688]: uid=0 cifs.upcall[1688]: creduid=1000 cifs.upcall[1688]: user=root cifs.upcall[1688]: pid=1674 cifs.upcall[1687]: upcall_target=app, switching namespaces to application thread cifs.upcall[1687]: get_cachename_from_process_env: pid == 0 cifs.upcall[1687]: get_existing_cc: default ccache is FILE:/tmp/krb5cc_1000 cifs.upcall[1687]: check_service_ticket_exists: unable to get client principal from cache: No credentials cache found (filename: /tmp/krb5cc_1000) cifs.upcall[1687]: get_tgt_time: unable to get principal cifs.upcall[1687]: main: valid TGT is not present in credential cache cifs.upcall[1687]: krb5_get_init_creds_keytab: -1765328378 cifs.upcall[1687]: Exit status 1 sudo[1671]: pam_unix(sudo:session): session closed for user root kernel: CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed kernel: CIFS: VFS: \\samba-dc.example.com Send error in SessSetup = -126 kernel: CIFS: VFS: cifs_mount failed w/return code = -126 We fail, due to only searching root's env, reproducing the issue. Let's try as root user: ubuntu@jammy-dc:~$ kdestroy ubuntu@jammy-dc:~$ unset KRB5CCNAME ubuntu@jammy-dc:~$ sudo -s root@jammy-dc:/home/ubuntu# kinit [email protected] Password for [email protected]: Warning: Your password will expire in 38 days on Fri Jul 25 02:42:43 2025 root@jammy-dc:/home/ubuntu# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: [email protected] Valid starting Expires Service principal 06/16/25 04:42:19 06/16/25 14:42:19 krbtgt/[email protected] renew until 06/17/25 04:42:16 root@jammy-dc:/home/ubuntu# mount -t cifs -o cruid=root,user=root,sec=krb5i,uid=0,gid=0,cred=/tmp/krb5cc_0 //samba-dc.example.com/demo /mnt/testshare1 root@jammy-dc:/home/ubuntu# mount -l | grep cifs //samba-dc.example.com/demo on /mnt/testshare1 type cifs (rw,relatime,vers=3.1.1,sec=krb5i,cruid=0,cache=strict,username=root,uid=0,forceuid,gid=0,forcegid,addr=192.168.122.79,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=4194304,wsize=4194304,bsize=1048576,echo_interval=60,actimeo=1,closetimeo=1,user=root) $ journalctl -b0 kernel: CIFS: enabling forceuid mount option implicitly because uid= option is specified kernel: CIFS: enabling forcegid mount option implicitly because gid= option is specified kernel: CIFS: Attempting to mount \\samba-dc.example.com\demo cifs.upcall[1709]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=samba-dc.example.com;ip4=192.168.122.79;sec=krb5;uid=0x0;creduid=0x0;user=root;pid=0x6a7 cifs.upcall[1710]: ver=2 cifs.upcall[1710]: host=samba-dc.example.com cifs.upcall[1710]: ip=192.168.122.79 cifs.upcall[1710]: sec=1 cifs.upcall[1710]: uid=0 cifs.upcall[1710]: creduid=0 cifs.upcall[1710]: user=root cifs.upcall[1710]: pid=1703 cifs.upcall[1709]: upcall_target=app, switching namespaces to application thread cifs.upcall[1709]: get_cachename_from_process_env: pid == 0 cifs.upcall[1709]: get_existing_cc: default ccache is FILE:/tmp/krb5cc_0 cifs.upcall[1709]: handle_krb5_mech: getting service ticket for samba-dc.example.com cifs.upcall[1709]: handle_krb5_mech: obtained service ticket cifs.upcall[1709]: Exit status 0 I then enabled -security-proposed from the following ppa: https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+packages?field.name_filter=cifs- utils&field.status_filter=published&field.series_filter= I then installed cifs-utils 2:6.14-1ubuntu0.3 Let's try and standard uid 1000 user: ubuntu@jammy-dc:~$ kinit [email protected] Password for [email protected]: Warning: Your password will expire in 38 days on Fri Jul 25 02:42:43 2025 ubuntu@jammy-dc:~$ klist Ticket cache: FILE:/tmp/krb5cc_1000 Default principal: [email protected] Valid starting Expires Service principal 06/16/25 04:43:49 06/16/25 14:43:49 krbtgt/[email protected] renew until 06/17/25 04:43:46 ubuntu@jammy-dc:~$ sudo mount -t cifs -o cruid=ubuntu,user=ubuntu,sec=krb5i,uid=1000,gid=1000,cred=/tmp/krb5cc_1000 //samba-dc.example.com/demo /mnt/testshare1 ubuntu@jammy-dc:~$ mount -l | grep cifs //samba-dc.example.com/demo on /mnt/testshare1 type cifs (rw,relatime,vers=3.1.1,sec=krb5i,cruid=1000,cache=strict,username=ubuntu,uid=1000,forceuid,gid=1000,forcegid,addr=192.168.122.79,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=4194304,wsize=4194304,bsize=1048576,echo_interval=60,actimeo=1,closetimeo=1,user=ubuntu) $ journalctl -b0 kernel: CIFS: enabling forceuid mount option implicitly because uid= option is specified kernel: CIFS: enabling forcegid mount option implicitly because gid= option is specified kernel: CIFS: Attempting to mount \\samba-dc.example.com\demo cifs.upcall[1895]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=samba-dc.example.com;ip4=192.168.122.79;sec=krb5;uid=0x3e8;creduid=0x3e8;user=ubuntu;pid=0x761 cifs.upcall[1896]: ver=2 cifs.upcall[1896]: host=samba-dc.example.com cifs.upcall[1896]: ip=192.168.122.79 cifs.upcall[1896]: sec=1 cifs.upcall[1896]: uid=1000 cifs.upcall[1896]: creduid=1000 cifs.upcall[1896]: user=ubuntu cifs.upcall[1896]: pid=1889 cifs.upcall[1895]: upcall_target=app, switching namespaces to application thread cifs.upcall[1895]: get_cachename_from_process_env: pathname=/proc/1889/environ cifs.upcall[1895]: get_existing_cc: default ccache is FILE:/tmp/krb5cc_1000 cifs.upcall[1895]: handle_krb5_mech: getting service ticket for samba-dc.example.com cifs.upcall[1895]: handle_krb5_mech: obtained service ticket cifs.upcall[1895]: Exit status 0 ubuntu@jammy-dc:~$ sudo umount /mnt/testshare1 Let's try as a different uid user, e.g. like AD user: ubuntu@jammy-dc:~$ export KRB5CCNAME=/tmp/krb5cc_11200 ubuntu@jammy-dc:~$ mv /tmp/krb5cc_1000 /tmp/krb5cc_11200 ubuntu@jammy-dc:~$ klist /tmp/krb5cc_11200 Ticket cache: FILE:/tmp/krb5cc_11200 Default principal: [email protected] Valid starting Expires Service principal 06/16/25 04:43:49 06/16/25 14:43:49 krbtgt/[email protected] renew until 06/17/25 04:43:46 06/16/25 04:43:59 06/16/25 14:43:49 cifs/samba-dc.example.com@ renew until 06/17/25 04:43:46 Ticket server: cifs/[email protected] ubuntu@jammy-dc:~$ sudo mount -t cifs -o sec=krb5i //samba-dc.example.com/demo /mnt/testshare1 ubuntu@jammy-dc:~$ mount -l | grep cifs //samba-dc.example.com/demo on /mnt/testshare1 type cifs (rw,relatime,vers=3.1.1,sec=krb5i,cruid=0,cache=strict,username=root,uid=0,noforceuid,gid=0,noforcegid,addr=192.168.122.79,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=4194304,wsize=4194304,bsize=1048576,echo_interval=60,actimeo=1,closetimeo=1) $ journalctl -b0 kernel: CIFS: Attempting to mount \\samba-dc.example.com\demo cifs.upcall[1915]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=samba-dc.example.com;ip4=192.168.122.79;sec=krb5;uid=0x0;creduid=0x0;user=root;pid=0x775 cifs.upcall[1916]: ver=2 cifs.upcall[1916]: host=samba-dc.example.com cifs.upcall[1916]: ip=192.168.122.79 cifs.upcall[1916]: sec=1 cifs.upcall[1916]: uid=0 cifs.upcall[1916]: creduid=0 cifs.upcall[1916]: user=root cifs.upcall[1916]: pid=1909 cifs.upcall[1915]: upcall_target=app, switching namespaces to application thread cifs.upcall[1915]: get_cachename_from_process_env: pid == 0 cifs.upcall[1915]: get_existing_cc: default ccache is FILE:/tmp/krb5cc_0 cifs.upcall[1915]: main: valid service ticket exists in credential cache cifs.upcall[1915]: handle_krb5_mech: getting service ticket for samba-dc.example.com cifs.upcall[1915]: handle_krb5_mech: obtained service ticket cifs.upcall[1915]: Exit status 0 The mount now works correctly, and the regression is fixed. Let's try as root user: root@jammy-dc:/home/ubuntu# klist Ticket cache: FILE:/tmp/krb5cc_11200 Default principal: [email protected] Valid starting Expires Service principal 06/16/25 04:43:49 06/16/25 14:43:49 krbtgt/[email protected] renew until 06/17/25 04:43:46 06/16/25 04:43:59 06/16/25 14:43:49 cifs/samba-dc.example.com@ renew until 06/17/25 04:43:46 Ticket server: cifs/[email protected] root@jammy-dc:/home/ubuntu# umount /mnt/testshare1 root@jammy-dc:/home/ubuntu# mount -t cifs -o cruid=root,user=root,sec=krb5i,uid=0,gid=0,cred=/tmp/krb5cc_0 //samba-dc.example.com/demo /mnt/testshare1 root@jammy-dc:/home/ubuntu# mount -l | grep cifs //samba-dc.example.com/demo on /mnt/testshare1 type cifs (rw,relatime,vers=3.1.1,sec=krb5i,cruid=0,cache=strict,username=root,uid=0,forceuid,gid=0,forcegid,addr=192.168.122.79,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=4194304,wsize=4194304,bsize=1048576,echo_interval=60,actimeo=1,closetimeo=1,user=root) $ journalctl -b0 kernel: CIFS: enabling forceuid mount option implicitly because uid= option is specified kernel: CIFS: enabling forcegid mount option implicitly because gid= option is specified kernel: CIFS: Attempting to mount \\samba-dc.example.com\demo cifs.upcall[1939]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=samba-dc.example.com;ip4=192.168.122.79;sec=krb5;uid=0x0;creduid=0x0;user=root;pid=0x78d cifs.upcall[1940]: ver=2 cifs.upcall[1940]: host=samba-dc.example.com cifs.upcall[1940]: ip=192.168.122.79 cifs.upcall[1940]: sec=1 cifs.upcall[1940]: uid=0 cifs.upcall[1940]: creduid=0 cifs.upcall[1940]: user=root cifs.upcall[1940]: pid=1933 cifs.upcall[1939]: upcall_target=app, switching namespaces to application thread cifs.upcall[1939]: get_cachename_from_process_env: pid == 0 cifs.upcall[1939]: get_existing_cc: default ccache is FILE:/tmp/krb5cc_0 cifs.upcall[1939]: main: valid service ticket exists in credential cache cifs.upcall[1939]: handle_krb5_mech: getting service ticket for samba-dc.example.com cifs.upcall[1939]: handle_krb5_mech: obtained service ticket cifs.upcall[1939]: Exit status 0 Next, we will just do a run with a patched kernel. I enabled -proposed and installed: ubuntu@jammy-dc:~$ uname -rv 5.15.0-142-generic #152-Ubuntu SMP Mon May 19 10:54:31 UTC 2025 We will keep cifs-utils from -security-proposed installed. Let's try and standard uid 1000 user: ubuntu@jammy-dc:~$ kinit [email protected] Password for [email protected]: Warning: Your password will expire in 38 days on Fri Jul 25 02:42:43 2025 ubuntu@jammy-dc:~$ klist Ticket cache: FILE:/tmp/krb5cc_1000 Default principal: [email protected] Valid starting Expires Service principal 06/16/25 04:50:22 06/16/25 14:50:22 krbtgt/[email protected] renew until 06/17/25 04:50:19 ubuntu@jammy-dc:~$ sudo mount -t cifs -o cruid=ubuntu,user=ubuntu,sec=krb5i,uid=1000,gid=1000,cred=/tmp/krb5cc_1000 //samba-dc.example.com/demo /mnt/testshare1 ubuntu@jammy-dc:~$ mount -l | grep cifs //samba-dc.example.com/demo on /mnt/testshare1 type cifs (rw,relatime,vers=3.1.1,sec=krb5i,cruid=1000,cache=strict,upcall_target=app,username=ubuntu,uid=1000,forceuid,gid=1000,forcegid,addr=192.168.122.79,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=4194304,wsize=4194304,bsize=1048576,echo_interval=60,actimeo=1,closetimeo=1,user=ubuntu) $ journalctl -b0 kernel: CIFS: enabling forceuid mount option implicitly because uid= option is specified kernel: CIFS: enabling forcegid mount option implicitly because gid= option is specified kernel: CIFS: Attempting to mount \\samba-dc.example.com\demo cifs.upcall[1505]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=samba-dc.example.com;ip4=192.168.122.79;sec=krb5;uid=0x3e8;creduid=0x3e8;user=ubuntu;pid=0x5cb;upcall_target=app cifs.upcall[1506]: ver=2 cifs.upcall[1506]: host=samba-dc.example.com cifs.upcall[1506]: ip=192.168.122.79 cifs.upcall[1506]: sec=1 cifs.upcall[1506]: uid=1000 cifs.upcall[1506]: creduid=1000 cifs.upcall[1506]: user=ubuntu cifs.upcall[1506]: pid=1483 cifs.upcall[1506]: upcall_target=app cifs.upcall[1505]: upcall_target=app, switching namespaces to application thread cifs.upcall[1505]: get_cachename_from_process_env: pathname=/proc/1483/environ cifs.upcall[1505]: get_existing_cc: default ccache is FILE:/tmp/krb5cc_1000 cifs.upcall[1505]: handle_krb5_mech: getting service ticket for samba-dc.example.com cifs.upcall[1505]: handle_krb5_mech: obtained service ticket cifs.upcall[1505]: Exit status 0 Let's try as a different uid user, e.g. like AD user: ubuntu@jammy-dc:~$ export KRB5CCNAME=/tmp/krb5cc_11200 ubuntu@jammy-dc:~$ mv /tmp/krb5cc_1000 /tmp/krb5cc_11200 ubuntu@jammy-dc:~$ klist Ticket cache: FILE:/tmp/krb5cc_11200 Default principal: [email protected] Valid starting Expires Service principal 06/16/25 04:50:22 06/16/25 14:50:22 krbtgt/[email protected] renew until 06/17/25 04:50:19 06/16/25 04:50:33 06/16/25 14:50:22 cifs/samba-dc.example.com@ renew until 06/17/25 04:50:19 Ticket server: cifs/[email protected] ubuntu@jammy-dc:~$ sudo mount -t cifs -o sec=krb5i //samba-dc.example.com/demo /mnt/testshare1 ubuntu@jammy-dc:~$ mount -l | grep cifs //samba-dc.example.com/demo on /mnt/testshare1 type cifs (rw,relatime,vers=3.1.1,sec=krb5i,cruid=1000,cache=strict,upcall_target=app,username=root,uid=0,noforceuid,gid=0,noforcegid,addr=192.168.122.79,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=4194304,wsize=4194304,bsize=1048576,echo_interval=60,actimeo=1,closetimeo=1) $ journalctl -b0 kernel: CIFS: Attempting to mount \\samba-dc.example.com\demo cifs.upcall[1528]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=samba-dc.example.com;ip4=192.168.122.79;sec=krb5;uid=0x0;creduid=0x3e8;user=root;pid=0x5ef;upcall_target=app cifs.upcall[1529]: ver=2 cifs.upcall[1529]: host=samba-dc.example.com cifs.upcall[1529]: ip=192.168.122.79 cifs.upcall[1529]: sec=1 cifs.upcall[1529]: uid=0 cifs.upcall[1529]: creduid=1000 cifs.upcall[1529]: user=root cifs.upcall[1529]: pid=1519 cifs.upcall[1529]: upcall_target=app cifs.upcall[1528]: upcall_target=app, switching namespaces to application thread cifs.upcall[1528]: get_cachename_from_process_env: pathname=/proc/1519/environ cifs.upcall[1528]: get_cachename_from_process_env: cachename = /tmp/krb5cc_11200 cifs.upcall[1528]: get_existing_cc: default ccache is FILE:/tmp/krb5cc_11200 cifs.upcall[1528]: main: valid service ticket exists in credential cache cifs.upcall[1528]: handle_krb5_mech: getting service ticket for samba-dc.example.com cifs.upcall[1528]: handle_krb5_mech: obtained service ticket cifs.upcall[1528]: Exit status 0 Let's try as root user: ubuntu@jammy-dc:~$ kdestroy ubuntu@jammy-dc:~$ unset KRB5CCNAME ubuntu@jammy-dc:~$ sudo -s root@jammy-dc:/home/ubuntu# kinit [email protected] Password for [email protected]: Warning: Your password will expire in 38 days on Fri Jul 25 02:42:43 2025 root@jammy-dc:/home/ubuntu# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: [email protected] Valid starting Expires Service principal 06/16/25 04:52:33 06/16/25 14:52:33 krbtgt/[email protected] renew until 06/17/25 04:52:29 root@jammy-dc:/home/ubuntu# mount -t cifs -o cruid=root,user=root,sec=krb5i,uid=0,gid=0,cred=/tmp/krb5cc_0 //samba-dc.example.com/demo /mnt/testshare1 root@jammy-dc:/home/ubuntu# mount -l | grep cifs //samba-dc.example.com/demo on /mnt/testshare1 type cifs (rw,relatime,vers=3.1.1,sec=krb5i,cruid=0,cache=strict,upcall_target=app,username=root,uid=0,forceuid,gid=0,forcegid,addr=192.168.122.79,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=4194304,wsize=4194304,bsize=1048576,echo_interval=60,actimeo=1,closetimeo=1,user=root) $ journalctl -b0 Jkernel: CIFS: enabling forceuid mount option implicitly because uid= option is specified Jkernel: CIFS: enabling forcegid mount option implicitly because gid= option is specified Jkernel: CIFS: Attempting to mount \\samba-dc.example.com\demo Jcifs.upcall[1553]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=samba-dc.example.com;ip4=192.168.122.79;sec=krb5;uid=0x0;creduid=0x0;user=root;pid=0x60d;upcall_target=app Jcifs.upcall[1554]: ver=2 Jcifs.upcall[1554]: host=samba-dc.example.com Jcifs.upcall[1554]: ip=192.168.122.79 Jcifs.upcall[1554]: sec=1 Jcifs.upcall[1554]: uid=0 Jcifs.upcall[1554]: creduid=0 Jcifs.upcall[1554]: user=root Jcifs.upcall[1554]: pid=1549 Jcifs.upcall[1554]: upcall_target=app Jcifs.upcall[1553]: upcall_target=app, switching namespaces to application thread Jcifs.upcall[1553]: get_cachename_from_process_env: pid == 0 Jcifs.upcall[1553]: get_existing_cc: default ccache is FILE:/tmp/krb5cc_0 Jcifs.upcall[1553]: handle_krb5_mech: getting service ticket for samba-dc.example.com Jcifs.upcall[1553]: handle_krb5_mech: obtained service ticket Jcifs.upcall[1553]: Exit status 0 Everything still mounts okay with the cifs-utils package in -security- proposed. Happy to mark verified for jammy. ** Tags added: verification-done-jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2112614 Title: Regression: After CVE-2025-2312 cifs.upcall can't find credential caches from user env To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cifs-utils/+bug/2112614/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
