Debian Gvfs vulnerabilities
7 known vulnerabilities affecting debian/gvfs.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2026-28296MEDIUMCVSS 4.3fixed in gvfs 1.46.2-2+deb11u1 (bullseye)2026
CVE-2026-28296 [MEDIUM] CVE-2026-28296: gvfs - A flaw was found in the FTP GVfs backend. A remote attacker could exploit this i...
A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code exe
debian
CVE-2026-28295MEDIUMCVSS 4.3fixed in gvfs 1.46.2-2+deb11u1 (bullseye)2026
CVE-2026-28295 [MEDIUM] CVE-2026-28295: gvfs - A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit thi...
A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information and attempts to connect to the specified endpoint, allowing the malicious server to probe for open ports accessible from the client's netwo
debian
CVE-2019-12447HIGHCVSS 7.3fixed in gvfs 1.38.1-4 (bookworm)2019
CVE-2019-12447 [HIGH] CVE-2019-12447: gvfs - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackenda...
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.
Scope: local
bookworm: resolved (fixed in 1.38.1-4)
bullseye: resolved (fixed in 1.38.1-4)
forky: resolved (fixed in 1.38.1-4)
sid: resolved (fixed in 1.38.1-4)
trixie: resolved (fixed in 1.38.1-4)
debian
CVE-2019-3827HIGHCVSS 7.0fixed in gvfs 1.38.1-3 (bookworm)2019
CVE-2019-3827 [HIGH] CVE-2019-3827: gvfs - An incorrect permission check in the admin backend in gvfs before version 1.39.4...
An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its p
debian
CVE-2019-12795HIGHCVSS 7.8fixed in gvfs 1.38.1-5 (bookworm)2019
CVE-2019-12795 [HIGH] CVE-2019-12795: gvfs - daemon/gvfsdaemon.c in gvfsd from GNOME gvfs before 1.38.3, 1.40.x before 1.40.2...
daemon/gvfsdaemon.c in gvfsd from GNOME gvfs before 1.38.3, 1.40.x before 1.40.2, and 1.41.x before 1.41.3 opened a private D-Bus server socket without configuring an authorization rule. A local attacker could connect to this server socket and issue D-Bus method calls. (Note that the server socket only accepts a single connection, so the attacker would have to discover
debian
CVE-2019-12448HIGHCVSS 8.1fixed in gvfs 1.38.1-4 (bookworm)2019
CVE-2019-12448 [HIGH] CVE-2019-12448: gvfs - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackenda...
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn't implement query_info_on_read/write.
Scope: local
bookworm: resolved (fixed in 1.38.1-4)
bullseye: resolved (fixed in 1.38.1-4)
forky: resolved (fixed in 1.38.1-4)
sid: resolved (fixed in 1.38.1-4)
trixie: resolved (fixed in 1.38.1
debian
CVE-2019-12449MEDIUMCVSS 5.7fixed in gvfs 1.38.1-4 (bookworm)2019
CVE-2019-12449 [MEDIUM] CVE-2019-12449: gvfs - An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackenda...
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles a file's user and group ownership during move (and copy with G_FILE_COPY_ALL_METADATA) operations from admin:// to file:// URIs, because root privileges are unavailable.
Scope: local
bookworm: resolved (fixed in 1.38.1-4)
bullseye: resolved (fixed in 1.38.1-4)
forky: res
debian