← Back to CVEs
CVE-2016-6855
N/ADescription
Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 3.19.x, and 3.20.x before 3.20.4, when used with glib before 2.44.1, allow remote attackers to cause a denial of service (out-of-bounds write and crash) via vectors involving passing invalid UTF-8 to GMarkup.
CVE Details
CVSS v3.1 ScoreN/A
Published9/7/2016
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
canonical:ubuntu_linuxfedoraproject:fedoragnome:eye_of_gnomegnome:glibopensuse:leapopensuse:opensuse
Weaknesses (CWE)
CWE-787
References
http://packetstormsecurity.com/files/138486/Gnome-Eye-Of-Gnome-3.10.2-Out-Of-Bounds-Write.html(cve@mitre.org)
http://www.securityfocus.com/bid/92616(cve@mitre.org)
http://www.ubuntu.com/usn/USN-3069-1(cve@mitre.org)
https://bugzilla.gnome.org/show_bug.cgi?id=770143(cve@mitre.org)
https://git.gnome.org/browse/eog/plain/NEWS?h=3.16.5(cve@mitre.org)
https://git.gnome.org/browse/eog/plain/NEWS?h=3.18.3(cve@mitre.org)
https://git.gnome.org/browse/eog/plain/NEWS?h=3.20.4(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVINHHR6VJKXTYYMAYKN5GROKHVT4UKB/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T6GFDHLNPUG7JHWM3QLXQNRA7NZGU2KI/(cve@mitre.org)
https://www.exploit-db.com/exploits/40291/(cve@mitre.org)
http://lists.opensuse.org/opensuse-updates/2016-09/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/138486/Gnome-Eye-Of-Gnome-3.10.2-Out-Of-Bounds-Write.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/92616(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-3069-1(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.gnome.org/show_bug.cgi?id=770143(af854a3a-2127-422b-91ae-364da2661108)
https://git.gnome.org/browse/eog/commit/?id=e99a8c00f959652fe7c10e2fa5a3a7a5c25e6af4(af854a3a-2127-422b-91ae-364da2661108)
https://git.gnome.org/browse/eog/plain/NEWS?h=3.16.5(af854a3a-2127-422b-91ae-364da2661108)
https://git.gnome.org/browse/eog/plain/NEWS?h=3.18.3(af854a3a-2127-422b-91ae-364da2661108)
https://git.gnome.org/browse/eog/plain/NEWS?h=3.20.4(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/04/msg00018.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVINHHR6VJKXTYYMAYKN5GROKHVT4UKB/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T6GFDHLNPUG7JHWM3QLXQNRA7NZGU2KI/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40291/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.