-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4781-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 27, 2020
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : blueman
CVE ID : CVE-2020-15238
Vaisha Bernard discovered that Blueman, a graphical bluetooth manager
performed insufficient validation on a D-Bus interface, which could
result in denial of service or privilege escalation.
For the stable distribution (buster), this problem has been fixed in
version 2.0.8-1+deb10u1.
We recommend that you upgrade your blueman packages.
For the detailed security status of blueman please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/blueman
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl+YaFoACgkQEMKTtsN8 TjZsPxAAsWL167EZ7JJIC4rt1hMY5Pe5J2wBdIjLBEXnQYYPH7fEtIS6tRKTfL5l YDzXq2BiBbO2Y5I0h97hEoXDhmB2GAT0Jld5rjfm59rXSnfbI7h4l6YJ35U2cLT2 vsz8wLRVv6xEt/4IpgSSSgYhcpVflOY31nbZItjmkPRpaUBY+MgLcoDURHbmUCFH WBpYHPwBgx33FzytF942KaY5ZUcwNyhmA7tnNdYpx8HYvynL3S/zwN/PLY3YDD5T l2b/yubHkAc/uxHBKHlhcBzDPBuSZd4ZR/7WgA61NNHNk+BEWIjKKgqbu4PItq7L AohK3b8+rthBpzVz/CPQBTzgqc6w1WjQwE/WwwsMa+OOC/2BTwEsZPTzDmTpeKm+ lfyGiuVVsKnqSzYfXN4UsS3RaH2yA2c7QaOlzhP7F6FpLUPEClIrT4RbY3F0I6LP Q8UMhPE2QGhsZn7ZilmQQV7pKlZEtoJVaJT8tEOgq/QJSxy94ubpe2gVBr6ju/Cp w859Oxtx84RnYrzeEYd/rAZc0ghJH5d/PcZELvo45gbdTOWaJgTKSsVA9DVAtS7p 0RrY31ewJKKvLV800tgz0v0X6ChTEB/77D3BH+IIqzES959jcniVS6m27u2bR9GF fhnVksTVs3B5X5xsT+ekeeQPmKGNqRfzZNyh1+aUjiFVWSsJqAU=
=waPl
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)