It was discovered that the GVfs FTP backend incorrectly handled IP addresses and ports returned by passive mode responses. A malicious remote server could possibly use this issue to help scan for open ports. (CVE-2026-28295)
It was discovered that the GVfs FTP backend incorrectly handled crafted file paths. A remote attacker could use this issue to terminate or inject arbitrary FTP commands, or possibly execute arbitrary code. (CVE-2026-28296)
{
"binaries": [
{
"binary_name": "gvfs",
"binary_version": "1.48.2-0ubuntu1.1"
},
{
"binary_name": "gvfs-backends",
"binary_version": "1.48.2-0ubuntu1.1"
},
{
"binary_name": "gvfs-common",
"binary_version": "1.48.2-0ubuntu1.1"
},
{
"binary_name": "gvfs-daemons",
"binary_version": "1.48.2-0ubuntu1.1"
},
{
"binary_name": "gvfs-fuse",
"binary_version": "1.48.2-0ubuntu1.1"
},
{
"binary_name": "gvfs-libs",
"binary_version": "1.48.2-0ubuntu1.1"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "gvfs",
"binary_version": "1.54.4-0ubuntu1~24.04.2"
},
{
"binary_name": "gvfs-backends",
"binary_version": "1.54.4-0ubuntu1~24.04.2"
},
{
"binary_name": "gvfs-common",
"binary_version": "1.54.4-0ubuntu1~24.04.2"
},
{
"binary_name": "gvfs-daemons",
"binary_version": "1.54.4-0ubuntu1~24.04.2"
},
{
"binary_name": "gvfs-fuse",
"binary_version": "1.54.4-0ubuntu1~24.04.2"
},
{
"binary_name": "gvfs-libs",
"binary_version": "1.54.4-0ubuntu1~24.04.2"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "gvfs",
"binary_version": "1.57.2-2ubuntu5.1"
},
{
"binary_name": "gvfs-backends",
"binary_version": "1.57.2-2ubuntu5.1"
},
{
"binary_name": "gvfs-common",
"binary_version": "1.57.2-2ubuntu5.1"
},
{
"binary_name": "gvfs-daemons",
"binary_version": "1.57.2-2ubuntu5.1"
},
{
"binary_name": "gvfs-fuse",
"binary_version": "1.57.2-2ubuntu5.1"
},
{
"binary_name": "gvfs-libs",
"binary_version": "1.57.2-2ubuntu5.1"
}
],
"availability": "No subscription required"
}