{"id":38217,"date":"2020-08-25T02:38:52","date_gmt":"2020-08-24T17:38:52","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-4470-1-sane-backends-vulnerabilities\/"},"modified":"2020-08-25T04:34:26","modified_gmt":"2020-08-24T19:34:26","slug":"usn-4470-1-sane-backends-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-4470-1-sane-backends-vulnerabilities\/","title":{"rendered":"USN-4470-1: sane-backends vulnerabilities"},"content":{"rendered":"<p>USN-4470-1: sane-backends vulnerabilities<\/p>\n<p>Kritphong Mongkhonvanit discovered that sane-backends incorrectly handled<br \/>\ncertain packets. A remote attacker could possibly use this issue to obtain<br \/>\nsensitive memory information. This issue only affected Ubuntu 16.04 LTS.<br \/>\n(CVE-2017-6318)<\/p>\n<p>It was discovered that sane-backends incorrectly handled certain memory<br \/>\noperations. A remote attacker could possibly use this issue to execute<br \/>\narbitrary code. This issue only applied to Ubuntu 18.04 LTS and Ubuntu<br \/>\n20.04 LTS. (CVE-2020-12861)<\/p>\n<p>It was discovered that sane-backends incorrectly handled certain memory<br \/>\noperations. A remote attacker could possibly use this issue to obtain<br \/>\nsensitive information. (CVE-2020-12862, CVE-2020-12863)<\/p>\n<p>It was discovered that sane-backends incorrectly handled certain memory<br \/>\noperations. A remote attacker could possibly use this issue to obtain<br \/>\nsensitive information. This issue only applied to Ubuntu 18.04 LTS and<br \/>\nUbuntu 20.04 LTS. (CVE-2020-12864)<\/p>\n<p>It was discovered that sane-backends incorrectly handled certain memory<br \/>\noperations. A remote attacker could possibly use this issue to execute<br \/>\narbitrary code. (CVE-2020-12865)<\/p>\n<p>It was discovered that sane-backends incorrectly handled certain memory<br \/>\noperations. A remote attacker could possibly use this issue to cause a<br \/>\ndenial of service. This issue only applied to Ubuntu 18.04 LTS and Ubuntu<br \/>\n20.04 LTS. (CVE-2020-12866)<\/p>\n<p>It was discovered that sane-backends incorrectly handled certain memory<br \/>\noperations. A remote attacker could possibly use this issue to cause a<br \/>\ndenial of service. (CVE-2020-12867)<br \/>\nSource: <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-4470-1\" target=\"_blank\" rel=\"noopener noreferrer\">USN-4470-1: sane-backends vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-4470-1: sane-backends vulnerabilities Kritphong Mongkhonvanit discovered that sane-backends incorrectly handled certain packets. A remote attacker could possibly use this issue to obtain sensitive memory information. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-6318) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could possibly use this issue to execute arbitrary code. This issue only applied to Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-12861) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2020-12862, CVE-2020-12863) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive information. This issue only applied to Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-12864) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-4470-1-sane-backends-vulnerabilities\/\" title=\"USN-4470-1: sane-backends vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-38217","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/38217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=38217"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/38217\/revisions"}],"predecessor-version":[{"id":38218,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/38217\/revisions\/38218"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=38217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=38217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=38217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}