An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-082.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html | Mailing List Third Party Advisory |
https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html | Mailing List Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html | Mailing List Third Party Advisory |
https://securitylab.github.com/advisories/GHSL-2020-075-libsane | Exploit Third Party Advisory |
https://usn.ubuntu.com/4470-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2020-06-24 13:15
Updated : 2022-11-08 03:32
NVD link : CVE-2020-12862
Mitre link : CVE-2020-12862
CVE.ORG link : CVE-2020-12862
JSON object : View
Products Affected
sane-project
- sane_backends
debian
- debian_linux
canonical
- ubuntu_linux
opensuse
- leap
CWE
CWE-125
Out-of-bounds Read