IPv6 logo

You are connected to Repology using legacy IPv4 protocol. Due to IPv4 address exhaustion it may become too expensive or impossible for Repology to support IPv4 in the nearest future. Time to switch to IPv6!

Versions Packages Information History CVEs Badges Report

Packages for blueman

170 package(s) known

blueman

2.2.5 (2.2.5-r0)

blueman-dev

2.2.5 (2.2.5-r0)

blueman-doc

2.2.5 (2.2.5-r0)

blueman-lang

2.2.5 (2.2.5-r0)

blueman

2.2.5 (2.2.5-r1)

blueman-dev

2.2.5 (2.2.5-r1)

blueman-doc

2.2.5 (2.2.5-r1)

blueman-lang

2.2.5 (2.2.5-r1)

blueman

2.3.5 (2.3.5-r0)

blueman-dev

2.3.5 (2.3.5-r0)

blueman-doc

2.3.5 (2.3.5-r0)

blueman-lang

2.3.5 (2.3.5-r0)

blueman

2.3.5 (2.3.5-r2)

blueman-dev

2.3.5 (2.3.5-r2)

blueman-doc

2.3.5 (2.3.5-r2)

blueman-lang

2.3.5 (2.3.5-r2)

blueman-pyc

2.3.5 (2.3.5-r2)

blueman

2.3.5 (2.3.5-r2)

blueman-dev

2.3.5 (2.3.5-r2)

blueman-doc

2.3.5 (2.3.5-r2)

blueman-lang

2.3.5 (2.3.5-r2)

blueman-pyc

2.3.5 (2.3.5-r2)

blueman

2.3.5 (2.3.5-alt1)

blueman

2.3.5 (2.3.5-alt1)

blueman

2.0.8 Potentially vulnerable (2.0.8-1.antix1)

blueman

2.1.4 (2.1.4-1.0antix1)

blueman

2.2.2 (2:2.2.2)
Apertis v2020
v2020/sdk

blueman

2.0.8 Potentially vulnerable (2.0.8-1+deb10u1co1)
Apertis v2021
v2021/sdk

blueman

2.0.8 Potentially vulnerable (2.0.8-1+deb10u1co1)
Apertis v2022
v2022/sdk

blueman

2.1.4 (2.1.4-1+apertis1)
Apertis v2023
v2023/sdk

blueman

2.1.4 (2.1.4-1+apertis1)

blueman

2.1.4 (2.1.4-1+apertis1)

blueman

2.3.5 (2.3.5-1.0)

blueman

2.3.5 (2.3.5-1.0)

blueman

2.3.5 (2.3.5-1.0)

blueman

2.3.5 (2.3.5-2)

blueman

2.3.5 (2.3.5-2)

blueman-git

2.2.1.r40.g361046f1 (2.2.1.r40.g361046f1-1)
Deepin
main

blueman

2.0.8.1 Potentially vulnerable (2.0.8.1-1)
Devuan 3.0
beowulf/main

blueman

2.0.8 Potentially vulnerable (2.0.8-1+deb10u1)
Devuan 4.0
chimaera/main

blueman

2.1.4 (2.1.4-1)
Devuan Unstable
unstable/main

blueman

2.3.5 (2.3.5-2)

net-wireless/blueman

2.3.5
Fedora 26
updates

blueman

2.1-alpha2 Potentially vulnerable (1:2.1-0.8.alpha2.fc26)
Fedora 26
release

blueman

2.1-alpha1 Potentially vulnerable (1:2.1-0.5.alpha1.fc26)
Fedora 27
updates

blueman

2.1-alpha2 Potentially vulnerable (1:2.1-0.8.alpha2.fc27)
Fedora 27
release

blueman

2.1-alpha1 Potentially vulnerable (1:2.1-0.7.alpha1.fc27)
Fedora 28
updates

blueman

2.1-alpha3 Potentially vulnerable (1:2.1-0.11.alpha3.fc28)
Fedora 28
release

blueman

2.1-alpha2 Potentially vulnerable (1:2.1-0.9.alpha2.fc28)
Fedora 29
updates

blueman

2.1.1 Potentially vulnerable (1:2.1.1-1.fc29)
Fedora 29
release

blueman

2.1-alpha2 Potentially vulnerable (1:2.1-0.12.alpha2.fc29)
Fedora 30
updates

blueman

2.1.3 Potentially vulnerable (1:2.1.3-1.fc30)
Fedora 30
release

blueman

2.1-alpha3 Potentially vulnerable (1:2.1-0.15.alpha3.fc30)
Fedora 31
updates

blueman

2.1.4 (1:2.1.4-1.fc31)
Fedora 31
release

blueman

2.1.1 Potentially vulnerable (1:2.1.1-2.fc31)
Fedora 32
updates

blueman

2.1.4 (1:2.1.4-1.fc32)
Fedora 32
release

blueman

2.1.2 Potentially vulnerable (1:2.1.2-2.fc32)
Fedora 33
updates

blueman

2.2.3 (1:2.2.3-1.fc33)
Fedora 33
release

blueman

2.1.3 Potentially vulnerable (1:2.1.3-4.fc33)
Fedora 34
updates

blueman

2.2.3 (1:2.2.3-1.fc34)
Fedora 34
release

blueman

2.1.4 (1:2.1.4-3.fc34)
Fedora 35
updates

blueman

2.3.5 (1:2.3.5-1.fc35)
Fedora 35
release

blueman

2.2.2 (1:2.2.2-1.fc35)
Fedora 36
updates

blueman

2.3.5 (1:2.3.5-1.fc36)
Fedora 36
release

blueman

2.2.3 (1:2.2.3-2.fc36)
Fedora 37
updates

blueman

2.3.5 (1:2.3.5-1.fc37)
Fedora 37
release

blueman

2.3.2 (1:2.3.2-1.fc37)
Fedora 38
release

blueman

2.3.5 (1:2.3.5-2.fc38)
Fedora Rawhide
development

blueman

2.3.5 (1:2.3.5-2.fc38)

net-wireless/blueman

9999

net-wireless/blueman

2.3.5

Blueman

1.10 Potentially vulnerable

blueman

2.3.5 (2.3.5-2)

net-wireless/blueman

9999

net-wireless/blueman

2.3.5

net-wireless/blueman

9999

net-wireless/blueman

2.3.5
Linux Mint 21
backport

blueman

2.3.5+vera (2.3.5+mint1+vera)

blueman

2.3.5 (2.3.5+mint1+vera)
LMDE 5
backport

blueman

2.3.5 (2.3.5+mint1+elsie)
Mageia 7
core/updates

blueman

2.1.4 (2.1.4-1.mga7)
Mageia 7
core/release

blueman

2.1-beta1 Potentially vulnerable (2.1-0.beta1.1.mga7)
Mageia 8
core/release

blueman

2.1.4 (2.1.4-1.mga8)
Mageia Cauldron
core/release

blueman

2.3.5 (2.3.5-1.mga9)
Manjaro Stable
community

blueman

2.3.5 (2.3.5-2)
Manjaro Testing
community

blueman

2.3.5 (2.3.5-2)

blueman

2.3.5 (2.3.5-2)

blueman

2.2.5 (2.2.5-0.1~mx19+1)

blueman

2.2.5 (2.2.5-0.1~mx21+1)

blueman

2.2.2

blueman

2.2.4

blueman

2.3.4

blueman

2.3.5

blueman

2.3.5
openmamba
devel

blueman

2.3.5 (2.3.5-1mamba)
OpenMandriva 4.0
unsupported/release

blueman

1.23 Potentially vulnerable (1.23-4)
OpenMandriva 4.1
unsupported/release

blueman

1.23 Potentially vulnerable (1.23-4)
OpenMandriva 4.2
unsupported/release

blueman

1.23 Potentially vulnerable (1.23-4)
OpenMandriva 4.3
unsupported/release

blueman

1.23 Potentially vulnerable (1.23-4)
OpenMandriva Rolling
unsupported/release

blueman

2.3.5 (2.3.5-2)
OpenMandriva Cooker
unsupported/release

blueman

2.3.5 (2.3.5-2)
openSUSE Leap 42.3
updates/oss

blueman

2.0.6 Potentially vulnerable (2.0.6-4.1)

blueman

2.0.4 Potentially vulnerable (2.0.4-1.1)
openSUSE Leap 15.0
updates/oss

blueman

2.0.6 Potentially vulnerable (2.0.6-lp150.5.1)

blueman

2.0.5 Potentially vulnerable (2.0.5-lp150.2.1)

blueman

2.0.8 Potentially vulnerable (2.0.8-lp151.1.1)
openSUSE Leap 15.2
updates/oss

blueman

2.1.4 (2.1.4-lp152.2.3.1)

blueman

2.1.2 Potentially vulnerable (2.1.2-lp152.1.3)

blueman

2.1.4 (2.1.4-bp153.1.18)

blueman

2.1.4 (2.1.4-bp154.1.85)

blueman

2.3.5 (2.3.5-bp155.1.6)

blueman

2.3.5 (2.3.5-1.2)
Parabola
extra

blueman

2.3.5 (2.3.5-2)

blueman

2.1.4 (2.1.4-1)
Parrot
parrot-updates/main

blueman

2.1.4 (2.1.4-1)
Parrot
parrot/main

blueman

2.1.4 (2.1.4-1)

blueman

2.0.8 Potentially vulnerable (2.0.8-1pclos2019)
  • Summary:
    Full featured bluetooth manager for GNOME/MATE/GTK+
  • Category:
    • Communications

blueman

2.3.1

blueman

2.0.8 Potentially vulnerable (2.0.8-1+deb10u1)

blueman

2.1.4 (2.1.4-1)

blueman

2.0.8 Potentially vulnerable (2.0.8-1+deb10u1)

blueman

2.1.4 (2.1.4-1)

blueman

2.3.5 (2.3.5-2)
Rosa 2016.1
contrib/updates

blueman

2.1.0-alpha3 Potentially vulnerable (2.1.0-2.1.alpha3)
Rosa 2021.1
contrib/release

blueman

2.3.2 (2.3.2-1)

blueman

2.0.6 Potentially vulnerable
Slackware 14.2
slackware

blueman

2.0.4 Potentially vulnerable
Slackware 15.0
slackware

blueman

2.2.3

blueman

2.3.5

blueman

2.0.6 Potentially vulnerable
Slackware64 14.2
slackware64

blueman

2.0.4 Potentially vulnerable
Slackware64 15.0
slackware64

blueman

2.2.3

blueman

2.3.5

blueman

2.0.6 Potentially vulnerable

blueman

2.0.4 Potentially vulnerable

blueman

2.2.3

blueman

2.1.1 Potentially vulnerable

blueman

1.10 Potentially vulnerable

blueman

1.10 Potentially vulnerable

blueman

2.3.5

blueman-dbginfo

2.3.5

blueman

2.3.5
Trisquel 10.0
nabia/main

blueman

2.1.2 Potentially vulnerable (2.1.2-1)
Trisquel 10.0
nabia-security/main

blueman

2.1.2 Potentially vulnerable (2.1.2-1ubuntu0.2)
Trisquel 10.0
nabia-updates/main

blueman

2.1.2 Potentially vulnerable (2.1.2-1ubuntu0.3)
Trisquel 11.0
aramo/main

blueman

2.2.4 (2.2.4-1)
Ubuntu 14.04
trusty/universe

blueman

1.23-git201403102151 Potentially vulnerable (1.23-git201403102151-1ubuntu1)
Ubuntu 16.04
xenial-updates/universe

blueman

2.0.4 Potentially vulnerable (2.0.4-1ubuntu2.1)
Ubuntu 16.04
xenial/universe

blueman

2.0.4 Potentially vulnerable (2.0.4-1ubuntu2)
Ubuntu 18.04
bionic/universe

blueman

2.0.5 Potentially vulnerable (2.0.5-1ubuntu1)
Ubuntu 18.04
bionic-updates/universe

blueman

2.0.5 Potentially vulnerable (2.0.5-1ubuntu1.1)
Ubuntu 20.04
focal-updates/universe

blueman

2.1.2 Potentially vulnerable (2.1.2-1ubuntu0.3)
Ubuntu 23.04
lunar/universe

blueman

2.3.5 (2.3.5-2build1)
Ubuntu 23.10
mantic/universe

blueman

2.3.5 (2.3.5-2build1)

blueman

2.3.5 (2.3.5_1)

Blueman

2.3.5