It was discovered that Eye of GNOME incorrectly handled certain invalid UTF-8 strings. If a user were tricked into opening a specially-crafted image, a remote attacker could use this issue to cause Eye of GNOME to crash, resulting in a denial of service, or possibly execute arbitrary code.
{ "binaries": [ { "binary_name": "eog", "binary_version": "3.10.2-0ubuntu5.2" }, { "binary_name": "eog-dbg", "binary_version": "3.10.2-0ubuntu5.2" }, { "binary_name": "eog-dbgsym", "binary_version": "3.10.2-0ubuntu5.2" }, { "binary_name": "eog-dev", "binary_version": "3.10.2-0ubuntu5.2" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "eog", "binary_version": "3.18.2-1ubuntu2.1" }, { "binary_name": "eog-dbg", "binary_version": "3.18.2-1ubuntu2.1" }, { "binary_name": "eog-dbgsym", "binary_version": "3.18.2-1ubuntu2.1" }, { "binary_name": "eog-dev", "binary_version": "3.18.2-1ubuntu2.1" } ], "availability": "No subscription required" }