vulnerability
Amazon Linux 2023: CVE-2026-28295: Medium priority package update for gvfs
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Feb 26, 2026 | Mar 27, 2026 | Mar 31, 2026 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Feb 26, 2026
Added
Mar 27, 2026
Modified
Mar 31, 2026
Description
A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information and attempts to connect to the specified endpoint, allowing the malicious server to probe for open ports accessible from the client's network.
Solutions
amazon-linux-2023-upgrade-gvfsamazon-linux-2023-upgrade-gvfs-archiveamazon-linux-2023-upgrade-gvfs-archive-debuginfoamazon-linux-2023-upgrade-gvfs-clientamazon-linux-2023-upgrade-gvfs-client-debuginfoamazon-linux-2023-upgrade-gvfs-debuginfoamazon-linux-2023-upgrade-gvfs-debugsourceamazon-linux-2023-upgrade-gvfs-fuseamazon-linux-2023-upgrade-gvfs-fuse-debuginfoamazon-linux-2023-upgrade-gvfs-goaamazon-linux-2023-upgrade-gvfs-goa-debuginfoamazon-linux-2023-upgrade-gvfs-nfsamazon-linux-2023-upgrade-gvfs-nfs-debuginfoamazon-linux-2023-upgrade-gvfs-smbamazon-linux-2023-upgrade-gvfs-smb-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.