|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for libgsf (DLA-2183-1)|
|Summary:||The remote host is missing an update for the 'libgsf'; package(s) announced via the DLA-2183-1 advisory.|
The remote host is missing an update for the 'libgsf'
package(s) announced via the DLA-2183-1 advisory.
It was discovered that there was a null pointer deference exploit in
libgsf, a I/O abstraction library for GNOME.
An error within the 'tar_directory_for_file()' function could be exploited
to trigger a null pointer dereference and subsequently cause a crash via a
crafted TAR file.
'libgsf' package(s) on Debian Linux.
For Debian 8 'Jessie', this problem has been fixed in version
We recommend that you upgrade your libgsf packages.
Common Vulnerability Exposure (CVE) ID: CVE-2016-9888|
BugTraq ID: 94860
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.