{"id":"MGASA-2019-0214","summary":"Updated gvfs packages fix security vulnerabilities","details":"Updated gvfs package fixes security vulnerabilities:\n\n* daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid\n  is not used (CVE-2019-12447).\n* daemon/gvfsbackendadmin.c has race conditions because the admin backend\n  doesn't implement query_info_on_read/write (CVE-2019-12448).\n* daemon/gvfsbackendadmin.c mishandles a file's user and group ownership\n  during move (and copy with G_FILE_COPY_ALL_METADATA) operations from\n  admin:// to file:// URIs, because root privileges are unavailable\n  (CVE-2019-12449).\n* daemon/gvfsdaemon.c in gvfsd from GNOME gvfs before 1.38.3, 1.40.x\n  before 1.40.2, and 1.41.x before 1.41.3 opened a private D-Bus server\n  socket without configuring an authorization rule (CVE-2019-12795)\n","modified":"2026-02-04T04:06:24.493353Z","published":"2019-07-21T18:17:27Z","related":["CVE-2019-12447","CVE-2019-12448","CVE-2019-12449","CVE-2019-12795"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2019-0214.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=25114"},{"type":"REPORT","url":"https://usn.ubuntu.com/usn/usn-4053-1"}],"affected":[{"package":{"name":"gvfs","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/gvfs?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.32.1-1.2.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0214.json"}},{"package":{"name":"gvfs","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/gvfs?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.40.1-4.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0214.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}