==========================================================================
Ubuntu Security Notice USN-4470-1
August 24, 2020
sane-backends vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in sane-backends.
Software Description:
– sane-backends: None
Details:
Kritphong Mongkhonvanit discovered that sane-backends incorrectly handled
certain packets. A remote attacker could possibly use this issue to obtain
sensitive memory information. This issue only affected Ubuntu 16.04 LTS.
(CVE-2017-6318)
It was discovered that sane-backends incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to execute
arbitrary code. This issue only applied to Ubuntu 18.04 LTS and Ubuntu
20.04 LTS. (CVE-2020-12861)
It was discovered that sane-backends incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to obtain
sensitive information. (CVE-2020-12862, CVE-2020-12863)
It was discovered that sane-backends incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to obtain
sensitive information. This issue only applied to Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-12864)
It was discovered that sane-backends incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to execute
arbitrary code. (CVE-2020-12865)
It was discovered that sane-backends incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to cause a
denial of service. This issue only applied to Ubuntu 18.04 LTS and Ubuntu
20.04 LTS. (CVE-2020-12866)
It was discovered that sane-backends incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to cause a
denial of service. (CVE-2020-12867)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
libsane1 1.0.29-0ubuntu5.1
Ubuntu 18.04 LTS:
libsane1 1.0.27-1~experimental3ubuntu2.3
Ubuntu 16.04 LTS:
libsane 1.0.25+git20150528-1ubuntu2.16.04.3
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4470-1
CVE-2017-6318, CVE-2020-12861, CVE-2020-12862, CVE-2020-12863,
CVE-2020-12864, CVE-2020-12865, CVE-2020-12866, CVE-2020-12867
Package Information:
https://launchpad.net/ubuntu/+source/sane-backends/1.0.29-0ubuntu5.1
https://launchpad.net/ubuntu/+source/sane-backends/1.0.27-1~experimental3ubuntu2.3
https://launchpad.net/ubuntu/+source/sane-backends/1.0.25+git20150528-1ubuntu2.16.04.3
—–BEGIN PGP SIGNATURE—–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=aAKT
—–END PGP SIGNATURE—–
—