Package        : eog
Version        : 3.14.1-1+deb8u1
CVE ID         : CVE-2016-6855


It was discovered that eog (Eye of GNOME) incorrectly handled certain 
invalid UTF-8 strings. If a user were tricked into opening a 
specially-crafted image, a remote attacker could use this issue to cause 
Eye of GNOME to crash, resulting in a denial of service, or possibly 
execute arbitrary code.


For Debian 8 "Jessie", this problem has been fixed in version 
3.14.1-1+deb8u1.

We recommend that you upgrade your eog packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2185-1: eog security update

April 25, 2020
It was discovered that eog (Eye of GNOME) incorrectly handled certain invalid UTF-8 strings

Summary


For Debian 8 "Jessie", this problem has been fixed in version
3.14.1-1+deb8u1.

We recommend that you upgrade your eog packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : eog
Version : 3.14.1-1+deb8u1
CVE ID : CVE-2016-6855

Related News