{"id":"MGASA-2020-0402","summary":"Updated blueman packages fixes a security vulnerability","details":"Vaisha Bernard discovered that blueman did not properly sanitize input on the\nD-Bus interface to blueman-mechanism. A local attacker could possibly use this\nissue to escalate privileges and run arbitrary code or cause a denial of\nservice (CVE-2020-15238).\n","modified":"2026-02-01T08:17:12.295156Z","published":"2020-11-08T14:14:27Z","related":["CVE-2020-15238"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0402.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=27485"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-4605-1"}],"affected":[{"package":{"name":"blueman","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/blueman?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.4-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0402.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}