[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2183-1] libgsf security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : libgsf
Version        : 1.14.30-2+deb8u1
CVE ID         : CVE-2016-9888


It was discovered that there was a null pointer deference exploit in libgsf, a I/O abstraction library for GNOME.

An error within the "tar_directory_for_file()" function could be exploited to trigger a null pointer dereference and subsequently cause a crash via a crafted TAR file.


For Debian 8 "Jessie", this problem has been fixed in version
1.14.30-2+deb8u1.

We recommend that you upgrade your libgsf packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=ylLQ
-----END PGP SIGNATURE-----


Reply to: