Debian LTS: DLA-2332-1: sane-backends security update
Summary
CVE-2020-12862
An out-of-bounds read in SANE Backends before 1.0.30 may allow a
malicious device connected to the same local network as the victim
to read important information, such as the ASLR offsets of the
program, aka GHSL-2020-082.
CVE-2020-12863
An out-of-bounds read in SANE Backends before 1.0.30 may allow a
malicious device connected to the same local network as the victim
to read important information, such as the ASLR offsets of the
program, aka GHSL-2020-083.
CVE-2020-12865
A heap buffer overflow in SANE Backends before 1.0.30 may allow a
malicious device connected to the same local network as the victim
to execute arbitrary code, aka GHSL-2020-084.
CVE-2020-12867
A NULL pointer dereference in sanei_epson_net_read in SANE
Backends before 1.0.30 allows a malicious device connected to the
same local network as the victim to cause a denial of service, aka
GHSL-2020-075.
For Debian 9 stretch, these problems have been fixed in version
1.0.25-4.1+deb9u1.
We recommend that you upgrade your sane-backends packages.
For the detailed security status of sane-backends please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/sane-backends
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS