Debian Security Advisory
DLA-2332-1 sane-backends -- LTS security update
- Date Reported:
- 17 Aug 2020
- Affected Packages:
- sane-backends
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 961302.
In Mitre's CVE dictionary: CVE-2020-12862, CVE-2020-12863, CVE-2020-12865, CVE-2020-12867. - More information:
-
Kevin Backhouse discovered multiple vulnerabilies in the epson2 and epsonds backends of SANE, a library for scanners. A malicious remote device could exploit these to trigger information disclosure, denial of service and possibly remote code execution.
- CVE-2020-12862
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-082.
- CVE-2020-12863
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-083.
- CVE-2020-12865
A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084.
- CVE-2020-12867
A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, aka GHSL-2020-075.
For Debian 9 stretch, these problems have been fixed in version 1.0.25-4.1+deb9u1.
We recommend that you upgrade your sane-backends packages.
For the detailed security status of sane-backends please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sane-backends
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2020-12862