KDE Project Security Advisory: Smb4K: Major security issues in KAuth mount helper

Albert Astals Cid aacid at kde.org
Fri Jan 9 22:11:39 GMT 2026


KDE Project Security Advisory
=============================

Title:          Smb4K: Major security issues in KAuth mount helper
Risk rating:    Major
CVE:            CVE-2025-66002, CVE-2025-66003
Versions:       Smb4K < 4.0.5
Date:           9 January 2026

Overview
========

The privileged KAuth mount helper of Smb4K runs with full root privileges and 
implements two KAuth actions accessible via D-Bus: mounting and unmounting a 
network share. Both actions are allowed for local users in active sessions 
without authentication, based on the Polkit 'yes' setting.

The unmount action has a faulty mount point validation that might give rise to 
a Denial-of-Service attack. Also, any mounted network share with file systems 
'cifs' or 'smb3' can be unmounted, no matter whether it was mounted by a user 
or the system (via /etc/fstab). Furthermore, arbitrary unmount options can be 
passed which can lead to unwanted behavior. The usage of KMountPoint class 
might lead to race conditions.

The mount action allows mounting shares to any path in the system. So, a share 
could be mounted over a system directory like e.g. '/bin'. Since any mount 
option is allowed by the implementation, potenially harmful combinations like 
'uid=0,file_mode=4755' can be passed. Furthermore, the path to the Kerberos 
ticket is passed in such a way that the ticket of any user on the system can 
be hijacked.


Impact
======

An attacker can exploit the shortcomings in the KAuth mount helper and perform 
arbitrary unmounts due to the lack of several problems in the unmount method. 
Additionally, an attacker, who has got access to and control over the contents 
of a Samba share, can use the mount method of the KAuth mount helper to 
conduct a local root exploit.


Workaround
==========

As long as the a fixed version can not be used, the following measures can be 
applied:

Raise the Polkit authentication requirements for the mount and unmount helper 
actions to 'auth_admin'.

Restrict D-Bus access to the mount helper utility to members of an opt-in 
group like 'smb4k'. Coupled with a security disclaimer, this would allow users 
that really want to use this feature to opt-in.


Solution
========

Update Smb4K to version 4.0.5 or later.


Credits
=======

Thanks to Matthias Gerstner and the SUSE security team for reporting this 
issue.

https://kde.org/info/security/advisory-20260109-1.txt




More information about the kde-announce mailing list