Package "libsane"
Name: |
libsane
|
Description: |
API library for scanners
|
Latest version: |
1.0.29-0ubuntu5.2 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Head package: |
sane-backends |
Homepage: |
http://www.sane-project.org |
Links
Download "libsane"
Other versions of "libsane" in Focal
Changelog
sane-backends (1.0.29-0ubuntu5.2) focal; urgency=medium
* debian/patches/0125-multiarch_dll_search_path.patch:
- Support /usr/lib64/sane as location for SANE backends
(LP: #1835220)
-- Gunnar Hjalmarsson <email address hidden> Thu, 17 Sep 2020 14:47:00 +0200
|
Source diff to previous version |
1835220 |
Please support /usr/lib64/sane |
|
sane-backends (1.0.29-0ubuntu5.1) focal-security; urgency=medium
* SECURITY UPDATE: multiple issues in epsonds network discovery
- debian/patches/CVE-2020-12861_12864_12866.patch: disable network
autodiscovery in backend/epsonds.conf.in.
- CVE-2020-12861
- CVE-2020-12864
- CVE-2020-12866
* SECURITY UPDATE: out-of-bounds read in epsonds
- debian/patches/CVE-2020-12862.patch: do not read beyond the end of
the token in backend/epsonds-cmd.c.
- CVE-2020-12862
* SECURITY UPDATE: out-of-bounds read in epsonds
- debian/patches/CVE-2020-12863.patch: read only up to seven hexdigits
to determine payload size in backend/epsonds-cmd.c.
- CVE-2020-12863
* SECURITY UPDATE: heap buffer overflow in epsonds
- debian/patches/CVE-2020-12865.patch: check for overflow when reading
image data in backend/epsonds-cmd.c, backend/epsonds.c,
backend/epsonds.h.
- CVE-2020-12865
* SECURITY UPDATE: NULL pointer dereference in epson2
- debian/patches/CVE-2020-12867.patch: rewrite network I/O in
backend/epson2_net.c, backend/epson2_net.h.
- CVE-2020-12867
-- Marc Deslauriers <email address hidden> Fri, 21 Aug 2020 10:48:50 -0400
|
CVE-2020-12861 |
A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to execute arbitrar |
CVE-2020-12864 |
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important |
CVE-2020-12866 |
A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a deni |
CVE-2020-12862 |
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important |
CVE-2020-12863 |
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important |
CVE-2020-12865 |
A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbit |
CVE-2020-12867 |
A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as th |
|
About
-
Send Feedback to @ubuntu_updates