Debian Security Advisory

DLA-2332-1 sane-backends -- LTS security update

Date Reported:
17 Aug 2020
Affected Packages:
sane-backends
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 961302.
In Mitre's CVE dictionary: CVE-2020-12862, CVE-2020-12863, CVE-2020-12865, CVE-2020-12867.
More information:

Kevin Backhouse discovered multiple vulnerabilies in the epson2 and epsonds backends of SANE, a library for scanners. A malicious remote device could exploit these to trigger information disclosure, denial of service and possibly remote code execution.

  • CVE-2020-12862

    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-082.

  • CVE-2020-12863

    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-083.

  • CVE-2020-12865

    A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084.

  • CVE-2020-12867

    A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, aka GHSL-2020-075.

For Debian 9 stretch, these problems have been fixed in version 1.0.25-4.1+deb9u1.

We recommend that you upgrade your sane-backends packages.

For the detailed security status of sane-backends please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sane-backends

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS