Versions Packages Information History CVEs Related Badges Report

Versions for bluez

365 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
bluez-hid2hci 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-bccmd 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-doc 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-cups 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-deprecated 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-tools 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-dev 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-libs 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-dbg 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-btmon 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-obexd 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-openrc 5.54 Potentially vulnerable - awilfox@adelielinux.org
Alpine Linux 3.8
main
bluez-dev 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-cups 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-btmon 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-libs 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-hid2hci 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-bccmd 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-doc 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-deprecated 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-meshctl 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-obexd 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-deprecated 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-cups 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-libs 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-obexd 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-bccmd 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-btmon 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-meshctl 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-doc 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-hid2hci 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-dev 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-hid2hci 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-cups 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-bccmd 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-btmon 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-doc 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-libs 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-dev 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-obexd 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-deprecated 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-meshctl 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-hid2hci 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-meshctl 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-btmgmt 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-obexd 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-zsh-completion 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-doc 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-dev 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-bccmd 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-btmon 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-deprecated 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-libs 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-cups 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-cups 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-libs 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-doc 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-deprecated 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-meshctl 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-btmgmt 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-btmon 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-dev 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-hid2hci 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-obexd 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-bccmd 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-zsh-completion 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-doc 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-bccmd 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-zsh-completion 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-btmon 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-deprecated 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-dev 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-hid2hci 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-cups 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-btmgmt 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-meshctl 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-obexd 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-libs 5.55 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-plugins 5.55 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-meshctl 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-hid2hci 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-doc 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-deprecated 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-zsh-completion 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-cups 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-btmon 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-obexd 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-libs 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-dev 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-plugins 5.56 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-btmgmt 5.56 - ncopa@alpinelinux.org
ALT Linux p9 bluez 5.55 Networking/Other lakostis@altlinux.org
ALT Sisyphus bluez 5.55 Networking/Other lakostis@altlinux.org
Amazon Linux 2 bluez 5.44 Potentially vulnerable Applications/System -
Amazon Linux 2 bluez 5.44 Potentially vulnerable Applications/System -
Amazon Linux 2 bluez 5.44 Potentially vulnerable Applications/System -
AOSC bluez 5.55 libs fallback-mnt-aosc@repology
Apertis v2020
v2020/target
bluez 5.50 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Apertis v2020
v2020-updates/target
bluez 5.50 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Apertis v2021 Development
v2021dev3/target
bluez 5.50 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Arch
extra
bluez 5.56 - -
Arch
extra
bluez-cups 5.56 - -
Arch
extra
bluez-hid2hci 5.56 - -
Arch
extra
bluez-libs 5.56 - -
Arch
extra
bluez-plugins 5.56 - -
Arch
extra
bluez-utils 5.56 - -
AUR bluez-git 5.52.r64.g6a83d1467 - bidulock@aur
Artix
world
bluez 5.56 - -
Artix
world
bluez-cups 5.56 - -
Artix
world
bluez-hid2hci 5.56 - -
Artix
world
bluez-libs 5.56 - -
Artix
world
bluez-plugins 5.56 - -
Artix
world
bluez-utils 5.56 - -
Astra Orel Stable
main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Astra Orel Current
main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Ataraxia Linux bluez 5.56 admin nagakamira@gmail.com
CentOS 6
os
bluez 4.66 Potentially vulnerable Applications/System -
CentOS 7
os
bluez 5.44 Potentially vulnerable Applications/System -
CentOS 8
BaseOS
bluez 5.52 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
bluez 5.50 Potentially vulnerable Unspecified bugs@centos.org
Chakra
core
bluez 5.50 Potentially vulnerable - -
Chakra
core
bluez-cups 5.50 Potentially vulnerable - -
Chakra
core
bluez-hid2hci 5.50 Potentially vulnerable - -
Chakra
core
bluez-libs 5.50 Potentially vulnerable - -
Chakra
core
bluez-plugins 5.50 Potentially vulnerable - -
Chakra
core
bluez-utils 5.50 Potentially vulnerable - -
Chaotic-AUR bluez-git 5.56.r9.g9bce8cafc - -
CRUX 3.4
opt
bluez 4.101 Potentially vulnerable - alan@mizrahi.com.ve
CRUX 3.5
contrib
bluez 5.55 - tbier@posteo.de
CRUX 3.6
contrib
bluez 5.56 - tbier@posteo.de
Debian Oldstable
oldstable/main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Debian Stable
stable/main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Debian Stable Backports
main
bluez 5.54 Potentially vulnerable misc team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Debian Testing
testing/main
bluez 5.55 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Debian Unstable
main
bluez 5.55 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Deepin
main
bluez 5.50.5 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Devuan 1.0 (Jessie)
jessie/main
bluez 5.23 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Devuan 2.0 (ASCII)
ascii/main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
bluez 5.55 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Devuan Unstable
unstable/main
bluez 5.55 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
distri bluez 5.50 Potentially vulnerable - -
Entware
armv7sf-k3.2
bluez-libs 5.54 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipselsf-k3.4
bluez-daemon 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
bluez-libs 5.54 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipssf-k3.4
bluez-libs 5.54 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
bluez-daemon 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
bluez-libs 5.54 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
bluez-utils 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
bluez-utils-extra 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
bluez-daemon 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
bluez-libs 5.54 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
bluez-utils 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
bluez-utils-extra 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
bluez-daemon 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
bluez-libs 5.54 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k2.6
bluez-utils 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
bluez-utils-extra 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
bluez-daemon 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
bluez-utils 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
bluez-utils-extra 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
bluez-utils 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
bluez-utils-extra 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
bluez-daemon 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
bluez-utils 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
bluez-utils-extra 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
bluez-daemon 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
bluez-libs 5.54 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
x64-k3.2
bluez-utils 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
bluez-utils-extra 5.54 Potentially vulnerable utils fallback-mnt-entware@repology
Exherbo
hardware
net-wireless/bluez 5.56 net-wireless fallback-mnt-exherbo@repology
Fedora 26
updates
bluez 5.46 Potentially vulnerable Unspecified -
Fedora 26
release
bluez 5.45 Potentially vulnerable Unspecified -
Fedora 27
updates
bluez 5.49 Potentially vulnerable Unspecified -
Fedora 27
release
bluez 5.47 Potentially vulnerable Unspecified -
Fedora 28
updates
bluez 5.50 Potentially vulnerable Unspecified -
Fedora 28
release
bluez 5.49 Potentially vulnerable Unspecified -
Fedora 29
updates
bluez 5.51 Potentially vulnerable Unspecified -
Fedora 29
release
bluez 5.50 Potentially vulnerable Unspecified -
Fedora 30
updates
bluez 5.52 Potentially vulnerable Unspecified -
Fedora 30
release
bluez 5.50 Potentially vulnerable Unspecified -
Fedora 31
updates
bluez 5.55 Unspecified -
Fedora 31
release
bluez 5.51 Potentially vulnerable Unspecified -
Fedora 32
updates
bluez 5.55 Unspecified -
Fedora 32
release
bluez 5.54 Potentially vulnerable Unspecified -
Fedora 33
updates
bluez 5.56 Unspecified -
Fedora 33
release
bluez 5.55 Unspecified -
Fedora Rawhide bluez 5.56 Unspecified -
Funtoo 1.4
core-kit
net-wireless/bluez 5.54 Potentially vulnerable net-wireless fallback-mnt-funtoo@repology
Gentoo net-wireless/bluez 5.55 net-wireless pacho@gentoo.org
GNU Guix bluez 5.55 - -
GoboLinux Bluez 5.54 Potentially vulnerable - -
Hyperbola
extra
bluez-libs 5.45 Potentially vulnerable - -
Hyperbola
extra
bluez-plugins 5.45 Potentially vulnerable - -
Hyperbola
extra
bluez-utils 5.45 Potentially vulnerable - -
Hyperbola
extra
bluez-hid2hci 5.45 Potentially vulnerable - -
Hyperbola
extra
bluez 5.45 Potentially vulnerable - -
Hyperbola
extra
bluez-cups 5.45 Potentially vulnerable - -
Kali Linux Rolling
main
bluez 5.55 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
KaOS
main
bluez 5.56 - demm@kaosx.us
Kwort 4.3.4 bluez 5.55 - -
LiGurOS stable net-wireless/bluez 5.55 net-wireless pacho@gentoo.org
LiGurOS develop net-wireless/bluez 5.55 net-wireless pacho@gentoo.org
Mageia 6
core/release
bluez 5.45 Potentially vulnerable Communications/Bluetooth -
Mageia 6
core/updates
bluez 5.45 Potentially vulnerable Communications/Bluetooth -
Mageia 6
core/updates
bluez 5.45 Potentially vulnerable Communications/Bluetooth -
Mageia 6
core/updates
bluez 5.45 Potentially vulnerable Communications/Bluetooth -
Mageia 7
core/updates
bluez 5.54 Potentially vulnerable Communications/Bluetooth -
Mageia 7
core/updates
bluez 5.54 Potentially vulnerable Communications/Bluetooth -
Mageia 7
core/release
bluez 5.50 Potentially vulnerable Communications/Bluetooth -
Mageia 8
core/release
bluez 5.55 Communications/Bluetooth -
Mageia Cauldron
core/release
bluez 5.56 Communications/Bluetooth -
Manjaro Stable
extra
bluez 5.55 - -
Manjaro Stable
extra
bluez-cups 5.55 - -
Manjaro Stable
extra
bluez-hid2hci 5.55 - -
Manjaro Stable
extra
bluez-libs 5.55 - -
Manjaro Stable
extra
bluez-plugins 5.55 - -
Manjaro Stable
extra
bluez-utils 5.55 - -
Manjaro Testing
extra
bluez-cups 5.56 - -
Manjaro Testing
extra
bluez-hid2hci 5.56 - -
Manjaro Testing
extra
bluez-libs 5.56 - -
Manjaro Testing
extra
bluez-plugins 5.56 - -
Manjaro Testing
extra
bluez-utils 5.56 - -
Manjaro Testing
extra
bluez 5.56 - -
Manjaro Unstable
extra
bluez 5.56 - -
Manjaro Unstable
extra
bluez-cups 5.56 - -
Manjaro Unstable
extra
bluez-hid2hci 5.56 - -
Manjaro Unstable
extra
bluez-libs 5.56 - -
Manjaro Unstable
extra
bluez-plugins 5.56 - -
Manjaro Unstable
extra
bluez-utils 5.56 - -
MX Linux MX-15 Testing
test
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
MX Linux MX-16
main
bluez 5.43 Potentially vulnerable admin stevep@mxlinux.org, iwamatsu@debian.org
nixpkgs stable bluez 5.55 - fallback-mnt-nix@repology
nixpkgs unstable bluez 5.55 - fallback-mnt-nix@repology
openEuler 20.03
source
bluez 5.50 Potentially vulnerable Unspecified -
openmamba
devel
bluez 5.56 Applications/Communication silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
bluez 5.50 Potentially vulnerable Communications bero@lindev.ch
OpenMandriva 4.1
main/release
bluez 5.52 Potentially vulnerable Communications tpgxyz@gmail.com
OpenMandriva Rolling
main/release
bluez 5.55 Communications bero@lindev.ch
OpenMandriva Cooker
main/release
bluez 5.55 Communications bero@lindev.ch
OpenMandriva Cooker
main/release
bluez 5.55 Communications tpgxyz@gmail.com
openSUSE Leap 42.3
main/oss
bluez 5.41 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 42.3
updates/oss
bluez 5.41 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
main/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
main/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.2
main/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.2
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.2
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.3
main/oss
bluez 5.55 Hardware/Mobile -
openSUSE Tumbleweed bluez 5.56 Hardware/Mobile -
OpenWrt 17.01 x86_64
packages
bluez-daemon 5.38 Potentially vulnerable utils nico@openwrt.org
OpenWrt 17.01 x86_64
packages
bluez-examples 5.38 Potentially vulnerable utils nico@openwrt.org
OpenWrt 17.01 x86_64
packages
bluez-libs 5.38 Potentially vulnerable libs nico@openwrt.org
OpenWrt 17.01 x86_64
packages
bluez-utils 5.38 Potentially vulnerable utils nico@openwrt.org
OpenWrt 18.06 x86_64
packages
bluez-daemon 5.49 Potentially vulnerable utils nico@openwrt.org
OpenWrt 18.06 x86_64
packages
bluez-examples 5.49 Potentially vulnerable utils nico@openwrt.org
OpenWrt 18.06 x86_64
packages
bluez-libs 5.49 Potentially vulnerable libs nico@openwrt.org
OpenWrt 18.06 x86_64
packages
bluez-utils 5.49 Potentially vulnerable utils nico@openwrt.org
OpenWrt 19.07 x86_64
packages
bluez-daemon 5.50 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
packages
bluez-libs 5.50 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
packages
bluez-utils 5.50 Potentially vulnerable utils fallback-mnt-openwrt@repology
Parabola
extra
bluez-libs 5.56 - -
Parabola
extra
bluez-plugins 5.56 - -
Parabola
extra
bluez-utils 5.56 - -
Parabola
extra
bluez 5.56 - -
Parabola
extra
bluez-cups 5.56 - -
Parabola
extra
bluez-hid2hci 5.56 - -
Pardus 17
main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Pardus 17
updates/main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Pardus 19
main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Pardus 19
main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Pardus 19
updates/main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Parrot
main
bluez 5.55 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
PCLinuxOS bluez 5.55 Communications -
Pisi Linux
main
bluez 5.54 Potentially vulnerable service admins@pisilinux.org
PLD Linux bluez 5.55 - -
PureOS Amber bluez 5.50 Potentially vulnerable misc team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
PureOS landing bluez 5.55 misc team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Raspbian Oldstable
main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Raspbian Stable
main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Raspbian Testing
main
bluez 5.55 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Rosa 2014.1
main/updates
bluez 5.36 Potentially vulnerable - -
Rosa 2014.1
main/release
bluez 5.21 Potentially vulnerable - -
Rosa 2016.1
main/updates
bluez 5.55 - -
Rosa 2016.1
main/testing
bluez 5.55 - -
Rosa 2016.1
main/testing
bluez 5.50 Potentially vulnerable - -
Rosa 2016.1
main/testing
bluez 5.50 Potentially vulnerable - -
Rosa 2016.1
main/release
bluez 5.44 Potentially vulnerable - -
Rosa 2019.1
main/release
bluez 5.55 Communications m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
bluez 4.66 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/updates
bluez 4.66 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
bluez 5.41 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
bluez 5.44 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
bluez 5.41 Potentially vulnerable Applications/System alex2048@mail.ru
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.41 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 4.101 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 4.101 Potentially vulnerable Applications/System -
Slackware 14.2
patches
bluez 5.47 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
bluez 5.40 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
bluez 5.56 - volkerdi@slackware.com
Slackware64 14.2
patches
bluez 5.47 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
bluez 5.40 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
bluez 5.56 - volkerdi@slackware.com
Slackwarearm 14.2
patches
bluez 5.47 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
bluez 5.40 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
bluez 5.55 - volkerdi@slackware.com
SliTaz Cooking bluez-dev 5.54 Potentially vulnerable development pankso@slitaz.org
SliTaz Cooking bluez 5.54 Potentially vulnerable system-tools pankso@slitaz.org
SliTaz Next bluez-tools 5.48 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Next bluez-tools-experimental 5.48 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Next bluez 5.48 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Next bluez-dev 5.48 Potentially vulnerable development devel@slitaz.org
Solus bluez 5.55 system.utils joshua@streambits.io
Solus bluez-dbginfo 5.55 debug joshua@streambits.io
Solus bluez-devel 5.55 programming.devel joshua@streambits.io
T2 SDE bluez 5.55 extra/tool baldzius@gmail.com
Trisquel 6.0
toutatis/main
bluez 4.98 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 6.0
toutatis-updates/main
bluez 4.98 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 7.0
belenos/main
bluez 4.101 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 7.0
belenos-updates/main
bluez 4.101 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 8.0
flidas/main
bluez 5.37 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 8.0
flidas-updates/main
bluez 5.37 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 9.0
etiona/main
bluez 5.48 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 9.0
etiona-updates/main
bluez 5.48 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 12.04
precise/main
bluez 4.98 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 12.04
precise-updates/main
bluez 4.98 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 14.04
trusty/main
bluez 4.101 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 14.04
trusty-updates/main
bluez 4.101 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 16.04
xenial/main
bluez 5.37 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 16.04
xenial-updates/main
bluez 5.37 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 18.04
bionic/main
bluez 5.48 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 18.04
bionic-updates/main
bluez 5.48 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 20.04
focal/main
bluez 5.53 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 20.10
groovy/main
bluez 5.55 admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 20.10
groovy-updates/main
bluez 5.55 admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Void Linux x86_64
x86_64
bluez 5.55 - congdanhqx@gmail.com
Void Linux x86_64
x86_64
bluez-cups 5.55 - congdanhqx@gmail.com
Void Linux x86_64
x86_64
bluez-deprecated 5.55 - congdanhqx@gmail.com
Void Linux x86_64
x86_64
libbluetooth 5.55 - congdanhqx@gmail.com
Void Linux x86_64
x86_64
libbluetooth-devel 5.55 - congdanhqx@gmail.com
Wikidata BlueZ 5.56 - -