{"id":"MGASA-2020-0360","summary":"Updated sane packages fix security vulnerabilities","details":"A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious\ndevice connected to the same local network as the victim to execute arbitrary\ncode, aka GHSL-2020-080. (CVE-2020-12861)\n\nAn out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious\ndevice connected to the same local network as the victim to read important\ninformation, such as the ASLR offsets of the program, aka GHSL-2020-082.\n(CVE-2020-12862)\n\nAn out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious\ndevice connected to the same local network as the victim to read important\ninformation, such as the ASLR offsets of the program, aka GHSL-2020-083.\n(CVE-2020-12863)\n\nAn out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious\ndevice connected to the same local network as the victim to read important\ninformation, such as the ASLR offsets of the program, aka GHSL-2020-081.\n(CVE-2020-12864)\n\nA heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious\ndevice connected to the same local network as the victim to execute arbitrary\ncode, aka GHSL-2020-084. (CVE-2020-12865)\n\nA NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious\ndevice connected to the same local network as the victim to cause a denial of\nservice, GHSL-2020-079. (CVE-2020-12866)\n\nA NULL pointer dereference in sanei_epson_net_read in SANE Backends before\n1.0.30 allows a malicious device connected to the same local network as the\nvictim to cause a denial of service, aka GHSL-2020-075. (CVE-2020-12867)\n","modified":"2026-01-31T23:00:03.861318Z","published":"2020-09-04T09:16:18Z","related":["CVE-2020-12861","CVE-2020-12862","CVE-2020-12863","CVE-2020-12864","CVE-2020-12865","CVE-2020-12866","CVE-2020-12867"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0360.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=26712"},{"type":"REPORT","url":"https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html"},{"type":"REPORT","url":"https://www.debian.org/lts/security/2020/dla-2231"},{"type":"REPORT","url":"https://www.debian.org/lts/security/2020/dla-2332"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-4470-1"}],"affected":[{"package":{"name":"sane","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/sane?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.28-1.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0360.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}