First published: Wed Jun 24 2020(Updated: )
A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/sane-backends | <1.0.27-1~ | 1.0.27-1~ |
ubuntu/sane-backends | <1.0.29-0ubuntu5.1 | 1.0.29-0ubuntu5.1 |
ubuntu/sane-backends | <1.0.30 | 1.0.30 |
debian/sane-backends | 1.0.31-4.1 1.2.1-2 1.3.0-1 | |
SANE Project SANE Backends | <1.0.30 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
openSUSE | =15.1 | |
openSUSE | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12866 has been assigned a severity level that can lead to denial of service due to a NULL pointer dereference.
To fix CVE-2020-12866, upgrade SANE Backends to version 1.0.30 or later.
Versions of SANE Backends prior to 1.0.30 are affected by CVE-2020-12866.
CVE-2020-12866 can be exploited by a malicious device on the same local network.
Users affected by CVE-2020-12866 may experience software crashes or service interruptions.