vulnerability
Amazon Linux 2023: CVE-2026-28296: Medium priority package update for gvfs
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Feb 26, 2026 | Mar 27, 2026 | Mar 31, 2026 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Feb 26, 2026
Added
Mar 27, 2026
Modified
Mar 31, 2026
Description
A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.
Solutions
amazon-linux-2023-upgrade-gvfsamazon-linux-2023-upgrade-gvfs-archiveamazon-linux-2023-upgrade-gvfs-archive-debuginfoamazon-linux-2023-upgrade-gvfs-clientamazon-linux-2023-upgrade-gvfs-client-debuginfoamazon-linux-2023-upgrade-gvfs-debuginfoamazon-linux-2023-upgrade-gvfs-debugsourceamazon-linux-2023-upgrade-gvfs-fuseamazon-linux-2023-upgrade-gvfs-fuse-debuginfoamazon-linux-2023-upgrade-gvfs-goaamazon-linux-2023-upgrade-gvfs-goa-debuginfoamazon-linux-2023-upgrade-gvfs-nfsamazon-linux-2023-upgrade-gvfs-nfs-debuginfoamazon-linux-2023-upgrade-gvfs-smbamazon-linux-2023-upgrade-gvfs-smb-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.