Package "sane-utils"
Name: |
sane-utils
|
Description: |
API library for scanners -- utilities
|
Latest version: |
1.0.25+git20150528-1ubuntu2.16.04.3 |
Release: |
xenial (16.04) |
Level: |
security |
Repository: |
main |
Head package: |
sane-backends |
Homepage: |
http://www.sane-project.org |
Links
Download "sane-utils"
Other versions of "sane-utils" in Xenial
Changelog
sane-backends (1.0.25+git20150528-1ubuntu2.16.04.3) xenial-security; urgency=medium
* SECURITY UPDATE: memory disclosure via crafted SANE_NET_CONTROL_OPTION
packet
- debian/patches/CVE-2017-6318.patch: address memory corruption and
information leakage in frontend/saned.c.
- CVE-2017-6318
* SECURITY UPDATE: out-of-bounds read in epsonds
- debian/patches/CVE-2020-12862.patch: do not read beyond the end of
the token in backend/epsonds-cmd.c.
- CVE-2020-12862
* SECURITY UPDATE: out-of-bounds read in epsonds
- debian/patches/CVE-2020-12863.patch: read only up to seven hexdigits
to determine payload size in backend/epsonds-cmd.c.
- CVE-2020-12863
* SECURITY UPDATE: heap buffer overflow in epsonds
- debian/patches/CVE-2020-12865.patch: check for overflow when reading
image data in backend/epsonds-cmd.c, backend/epsonds.c,
backend/epsonds.h.
- CVE-2020-12865
* SECURITY UPDATE: NULL pointer dereference in epson2
- debian/patches/CVE-2020-12867.patch: rewrite network I/O in
backend/epson2_net.c, backend/epson2_net.h.
- CVE-2020-12867
-- Marc Deslauriers <email address hidden> Fri, 21 Aug 2020 11:15:11 -0400
|
CVE-2017-6318 |
saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet. |
CVE-2020-12862 |
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important |
CVE-2020-12863 |
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important |
CVE-2020-12865 |
A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbit |
CVE-2020-12867 |
A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as th |
|
About
-
Send Feedback to @ubuntu_updates