CVE-2026-28295

NameCVE-2026-28295
DescriptionA flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information and attempts to connect to the specified endpoint, allowing the malicious server to probe for open ports accessible from the client's network.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1129285

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gvfs (PTS)bullseye1.46.2-1vulnerable
bookworm1.50.3-1vulnerable
trixie1.57.2-2vulnerable
forky1.59.90-3fixed
sid1.60.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gvfssource(unstable)1.59.90-11129285

Notes

[trixie] - gvfs <no-dsa> (Minor issue)
[bookworm] - gvfs <no-dsa> (Minor issue)
https://gitlab.gnome.org/GNOME/gvfs/-/issues/832
Fixed by: https://gitlab.gnome.org/GNOME/gvfs/-/commit/20db8173252ea88a4af05dc9a24aad6f29b807ad (1.59.90)
Fixed by: https://gitlab.gnome.org/GNOME/gvfs/-/commit/30f50ce256c2fb66828373973c4fd1542088de72 (1.58.2)
Fixed by: https://gitlab.gnome.org/GNOME/gvfs/-/commit/30b89fc61ef620dfa81492f68a21ee1fdb7021f3 (1.56.2)

Search for package or bug name: Reporting problems