Versions Packages Information History CVEs Related Badges Report

Versions for bluez

492 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
bluez-cups 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-dev 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-tools 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-btmon 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-doc 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-btmgmt 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-libs 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-deprecated 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-openrc 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-dbg 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-bccmd 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-hid2hci 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-obexd 5.55 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-cups 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-doc 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-obexd 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-bccmd 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-btmon 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-tools 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-dev 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-hid2hci 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-libs 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-deprecated 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-openrc 5.54 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
bluez-dbg 5.54 Potentially vulnerable - awilfox@adelielinux.org
AlmaLinux 8
BaseOS
bluez 5.56 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
bluez-doc 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-hid2hci 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-cups 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-btmon 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-meshctl 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-bccmd 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-deprecated 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-obexd 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-dev 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bluez-libs 5.49 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-deprecated 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-cups 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-libs 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-obexd 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-bccmd 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-btmon 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-meshctl 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-doc 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-hid2hci 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bluez-dev 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-dev 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-bccmd 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-deprecated 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-libs 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-cups 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-obexd 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-hid2hci 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-btmon 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-meshctl 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bluez-doc 5.50 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-zsh-completion 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-doc 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-deprecated 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-btmgmt 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-libs 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-dev 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-hid2hci 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-btmon 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-cups 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-bccmd 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-obexd 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
bluez-meshctl 5.52 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-doc 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-zsh-completion 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-hid2hci 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-cups 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-dev 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-btmon 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-obexd 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-btmgmt 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-libs 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-deprecated 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-meshctl 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
bluez-bccmd 5.54 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-zsh-completion 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-btmon 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-deprecated 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-dev 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-hid2hci 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-cups 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-btmgmt 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-meshctl 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-obexd 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-libs 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-plugins 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-doc 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
bluez-bccmd 5.55 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-obexd 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-btmon 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-doc 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-dev 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-libs 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-meshctl 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-zsh-completion 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-btmgmt 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-cups 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-deprecated 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-plugins 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
bluez-hid2hci 5.58 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-zsh-completion 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-btmgmt 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-cups 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-openrc 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-dev 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-btmon 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-hid2hci 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-doc 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-meshctl 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-deprecated 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-deprecated-openrc 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-obexd 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-plugins 5.64 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
bluez-libs 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-hid2hci 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-zsh-completion 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-deprecated-openrc 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-openrc 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-deprecated 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-dev 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-plugins 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-meshctl 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-btmon 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-btmgmt 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-cups 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-doc 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-libs 5.64 - ncopa@alpinelinux.org
Alpine Linux Edge
main
bluez-obexd 5.64 - ncopa@alpinelinux.org
ALT Linux p9 bluez 5.55 Potentially vulnerable Networking/Other lakostis@altlinux.org
ALT Linux p10 bluez 5.62 Potentially vulnerable Networking/Other lakostis@altlinux.org
ALT Sisyphus bluez 5.64 Networking/Other lakostis@altlinux.org
Amazon Linux 2 bluez 5.44 Potentially vulnerable Applications/System -
Amazon Linux 2 bluez 5.44 Potentially vulnerable Applications/System -
Amazon Linux 2 bluez 5.44 Potentially vulnerable Applications/System -
antiX-21
main
bluez 5.55 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
AOSC bluez 5.55 Potentially vulnerable libs fallback-mnt-aosc@repology
Apertis v2020
v2020/target
bluez 5.50 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Apertis v2021
v2021/target
bluez 5.50 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Apertis v2022
v2022/target
bluez 5.55 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Apertis v2023 Development
v2023dev1/target
bluez 5.55 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Arch
extra
bluez 5.64 - -
Arch
extra
bluez-utils 5.64 - -
Arch
extra
bluez-libs 5.64 - -
Arch
extra
bluez-cups 5.64 - -
Arch
extra
bluez-plugins 5.64 - -
Arch
extra
bluez-hid2hci 5.64 - -
Arch Linux 32 i486
extra
bluez-libs 5.64 - -
Arch Linux 32 i486
extra
bluez 5.64 - -
Arch Linux 32 i486
extra
bluez-cups 5.64 - -
Arch Linux 32 i486
extra
bluez-utils 5.64 - -
Arch Linux 32 i486
extra
bluez-hid2hci 5.64 - -
Arch Linux 32 i486
extra
bluez-plugins 5.64 - -
Arch Linux 32 i686
extra
bluez-libs 5.64 - -
Arch Linux 32 i686
extra
bluez 5.64 - -
Arch Linux 32 i686
extra
bluez-hid2hci 5.64 - -
Arch Linux 32 i686
extra
bluez-utils 5.64 - -
Arch Linux 32 i686
extra
bluez-plugins 5.64 - -
Arch Linux 32 i686
extra
bluez-cups 5.64 - -
Arch Linux 32 pentium4
extra
bluez-utils 5.64 - -
Arch Linux 32 pentium4
extra
bluez-hid2hci 5.64 - -
Arch Linux 32 pentium4
extra
bluez-cups 5.64 - -
Arch Linux 32 pentium4
extra
bluez 5.64 - -
Arch Linux 32 pentium4
extra
bluez-libs 5.64 - -
Arch Linux 32 pentium4
extra
bluez-plugins 5.64 - -
Arch Linux ARM aarch64
extra
bluez-cups 5.64 - -
Arch Linux ARM aarch64
extra
bluez-debug 5.64 - -
Arch Linux ARM aarch64
extra
bluez-hid2hci 5.64 - -
Arch Linux ARM aarch64
extra
bluez-libs 5.64 - -
Arch Linux ARM aarch64
extra
bluez-utils 5.64 - -
Arch Linux ARM aarch64
extra
bluez 5.64 - -
Arch Linux ARM aarch64
extra
bluez-plugins 5.64 - -
Arch Linux ARM armv7h
extra
bluez-utils 5.64 - -
Arch Linux ARM armv7h
extra
bluez-hid2hci 5.64 - -
Arch Linux ARM armv7h
extra
bluez-libs 5.64 - -
Arch Linux ARM armv7h
extra
bluez 5.64 - -
Arch Linux ARM armv7h
extra
bluez-plugins 5.64 - -
Arch Linux ARM armv7h
extra
bluez-cups 5.64 - -
Arch Linux ARM armv7h
extra
bluez-debug 5.64 - -
ArchPOWER powerpc bluez-debug 5.64 - -
ArchPOWER powerpc bluez 5.64 - -
ArchPOWER powerpc bluez-hid2hci 5.64 - -
ArchPOWER powerpc bluez-plugins 5.64 - -
ArchPOWER powerpc bluez-cups 5.64 - -
ArchPOWER powerpc bluez-libs 5.64 - -
ArchPOWER powerpc bluez-utils 5.64 - -
ArchPOWER powerpc64le bluez-debug 5.64 - -
ArchPOWER powerpc64le bluez-utils 5.64 - -
ArchPOWER powerpc64le bluez-plugins 5.64 - -
ArchPOWER powerpc64le bluez-hid2hci 5.64 - -
ArchPOWER powerpc64le bluez-cups 5.64 - -
ArchPOWER powerpc64le bluez-libs 5.64 - -
ArchPOWER powerpc64le bluez 5.64 - -
ArchPOWER riscv64 bluez-hid2hci 5.64 - -
ArchPOWER riscv64 bluez-debug 5.64 - -
ArchPOWER riscv64 bluez-plugins 5.64 - -
ArchPOWER riscv64 bluez 5.64 - -
ArchPOWER riscv64 bluez-cups 5.64 - -
ArchPOWER riscv64 bluez-utils 5.64 - -
ArchPOWER riscv64 bluez-libs 5.64 - -
AUR bluez-git 5.63.r15.geb5c7518d - bidulock@aur
Artix
world
bluez 5.64 - -
Artix
world
bluez-libs 5.64 - -
Artix
world
bluez-cups 5.64 - -
Artix
world
bluez-hid2hci 5.64 - -
Artix
world
bluez-utils 5.64 - -
Artix
world
bluez-plugins 5.64 - -
Astra Orel Stable
main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Ataraxia GNU/Linux bluez 5.56 Potentially vulnerable admin nagakamira@gmail.com
CentOS 6
os
bluez 4.66 Potentially vulnerable Applications/System -
CentOS 7
os
bluez 5.44 Potentially vulnerable Applications/System -
CentOS 8
BaseOS
bluez 5.56 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
BaseOS
bluez 5.56 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
BaseOS
bluez 5.56 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
BaseOS
bluez 5.56 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
BaseOS
bluez 5.52 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
BaseOS
bluez 5.52 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 9
BaseOS
bluez 5.56 Potentially vulnerable Unspecified builder@centos.org
CRUX 3.4
opt
bluez 4.101 Potentially vulnerable - alan@mizrahi.com.ve
CRUX 3.5
contrib
bluez 5.55 Potentially vulnerable - tbier@posteo.de
CRUX 3.6
contrib
bluez 5.64 - tbier@posteo.de
Debian 8
jessie/main
bluez 5.23 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Debian 9
stretch/main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Debian 10
buster/main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Debian 10 Backports
buster-backports/main
bluez 5.54 Potentially vulnerable misc team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Debian 11
bullseye/main
bluez 5.55 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Debian 12
bookworm/main
bluez 5.64 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Debian Unstable
sid/main
bluez 5.64 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Deepin
main
bluez 5.50.26 Potentially vulnerable - team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Devuan 1.0
jessie/main
bluez 5.23 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Devuan 2.0
ascii/main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Devuan 3.0
beowulf/main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Devuan 4.0
chimaera/main
bluez 5.55 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Devuan Unstable
unstable/main
bluez 5.64 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
distri bluez 5.50 Potentially vulnerable - -
Endless OS 4.0
core
bluez 5.55 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Endless OS master
core
bluez 5.55 Potentially vulnerable main team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Entware
x64-k3.2
bluez-daemon 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
bluez-libs 5.62 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
x64-k3.2
bluez-utils 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
bluez-utils-extra 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
bluez-utils-extra 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
bluez-utils-extra 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
bluez-daemon 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
bluez-libs 5.62 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
bluez-utils 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
bluez-daemon 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
bluez-libs 5.62 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
bluez-utils 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
bluez-utils-extra 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
bluez-daemon 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
bluez-libs 5.62 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k2.6
bluez-utils 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
bluez-daemon 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
bluez-libs 5.62 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k3.2
bluez-utils 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
bluez-utils-extra 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
bluez-daemon 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
bluez-libs 5.62 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipselsf-k3.4
bluez-utils 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
bluez-utils-extra 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
bluez-daemon 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
bluez-libs 5.62 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipssf-k3.4
bluez-utils 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
bluez-utils-extra 5.62 Potentially vulnerable utils fallback-mnt-entware@repology
EuroLinux 8
baseos
bluez 5.56 Potentially vulnerable Unspecified -
EuroLinux 8
baseos
bluez 5.52 Potentially vulnerable Unspecified -
EuroLinux 8
baseos
bluez 5.52 Potentially vulnerable Unspecified -
EuroLinux 8
baseos
bluez 5.52 Potentially vulnerable Unspecified -
EuroLinux 8
baseos
bluez 5.50 Potentially vulnerable Unspecified -
Exherbo
hardware
net-wireless/bluez 5.64 net-wireless fallback-mnt-exherbo@repology
Fedora 26
updates
bluez 5.46 Potentially vulnerable Unspecified -
Fedora 26
release
bluez 5.45 Potentially vulnerable Unspecified -
Fedora 27
updates
bluez 5.49 Potentially vulnerable Unspecified -
Fedora 27
release
bluez 5.47 Potentially vulnerable Unspecified -
Fedora 28
updates
bluez 5.50 Potentially vulnerable Unspecified -
Fedora 28
release
bluez 5.49 Potentially vulnerable Unspecified -
Fedora 29
updates
bluez 5.51 Potentially vulnerable Unspecified -
Fedora 29
release
bluez 5.50 Potentially vulnerable Unspecified -
Fedora 30
updates
bluez 5.52 Potentially vulnerable Unspecified -
Fedora 30
release
bluez 5.50 Potentially vulnerable Unspecified -
Fedora 31
updates
bluez 5.55 Potentially vulnerable Unspecified -
Fedora 31
release
bluez 5.51 Potentially vulnerable Unspecified -
Fedora 32
updates
bluez 5.55 Potentially vulnerable Unspecified -
Fedora 32
release
bluez 5.54 Potentially vulnerable Unspecified -
Fedora 33
updates
bluez 5.60 Potentially vulnerable Unspecified -
Fedora 33
release
bluez 5.55 Potentially vulnerable Unspecified -
Fedora 34
updates
bluez 5.64 Unspecified -
Fedora 34
release
bluez 5.56 Potentially vulnerable Unspecified -
Fedora 35
updates
bluez 5.64 Unspecified -
Fedora 35
release
bluez 5.61 Potentially vulnerable Unspecified -
Fedora 36
development
bluez 5.64 Unspecified -
Fedora Rawhide
development
bluez 5.64 Unspecified -
Funtoo 1.4
core-kit
net-wireless/bluez 5.64 net-wireless fallback-mnt-funtoo@repology
Gentoo net-wireless/bluez 5.64 net-wireless pacho@gentoo.org
GNU Guix bluez 5.61 Potentially vulnerable - -
GoboLinux Bluez 5.61 Potentially vulnerable - -
Kali Linux Rolling
main
bluez 5.64 admin devel@kali.org, arnaudr@kali.org, re4son@kali.org, sophie@offensive-security.com
KaOS
main
bluez 5.64 - demm@kaosx.us
LiGurOS stable net-wireless/bluez 5.64 net-wireless pacho@gentoo.org
LiGurOS develop net-wireless/bluez 5.64 net-wireless pacho@gentoo.org
Mageia 7
core/updates
bluez 5.54 Potentially vulnerable Communications/Bluetooth -
Mageia 7
core/updates
bluez 5.54 Potentially vulnerable Communications/Bluetooth -
Mageia 7
core/updates
bluez 5.54 Potentially vulnerable Communications/Bluetooth -
Mageia 7
core/release
bluez 5.50 Potentially vulnerable Communications/Bluetooth -
Mageia 8
core/release
bluez 5.55 Potentially vulnerable Communications/Bluetooth -
Mageia 8
core/updates
bluez 5.55 Potentially vulnerable Communications/Bluetooth -
Mageia 8
core/updates
bluez 5.55 Potentially vulnerable Communications/Bluetooth -
Mageia 8
core/updates
bluez 5.55 Potentially vulnerable Communications/Bluetooth -
Mageia 8
core/updates
bluez 5.55 Potentially vulnerable Communications/Bluetooth -
Mageia Cauldron
core/release
bluez 5.64 Communications/Bluetooth -
Manjaro Stable
extra
bluez-hid2hci 5.64 - -
Manjaro Stable
extra
bluez 5.64 - -
Manjaro Stable
extra
bluez-plugins 5.64 - -
Manjaro Stable
extra
bluez-cups 5.64 - -
Manjaro Stable
extra
bluez-libs 5.64 - -
Manjaro Stable
extra
bluez-utils 5.64 - -
Manjaro Testing
extra
bluez-cups 5.64 - -
Manjaro Testing
extra
bluez 5.64 - -
Manjaro Testing
extra
bluez-libs 5.64 - -
Manjaro Testing
extra
bluez-hid2hci 5.64 - -
Manjaro Testing
extra
bluez-utils 5.64 - -
Manjaro Testing
extra
bluez-plugins 5.64 - -
Manjaro Unstable
extra
bluez-hid2hci 5.64 - -
Manjaro Unstable
extra
bluez-plugins 5.64 - -
Manjaro Unstable
extra
bluez 5.64 - -
Manjaro Unstable
extra
bluez-utils 5.64 - -
Manjaro Unstable
extra
bluez-cups 5.64 - -
Manjaro Unstable
extra
bluez-libs 5.64 - -
MX Linux MX-15 Testing
test
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
MX Linux MX-16
main
bluez 5.43 Potentially vulnerable admin stevep@mxlinux.org, iwamatsu@debian.org
nixpkgs stable 21.05 bluez 5.58 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 21.11 bluez 5.63 - fallback-mnt-nix@repology
nixpkgs unstable bluez 5.64 - fallback-mnt-nix@repology
nixpkgs unstable bluez 5.64 - fallback-mnt-nix@repology
openEuler 20.03
source
bluez 5.50 Potentially vulnerable Unspecified -
openmamba
devel
bluez 5.64 Applications/Communication silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
bluez 5.50 Potentially vulnerable Communications bero@lindev.ch
OpenMandriva 4.1
main/release
bluez 5.52 Potentially vulnerable Communications tpgxyz@gmail.com
OpenMandriva 4.2
main/release
bluez 5.55 Potentially vulnerable Communications bero@lindev.ch
OpenMandriva 4.2
main/updates
bluez 5.55 Potentially vulnerable Communications tpgxyz@gmail.com
OpenMandriva Rolling
main/release
bluez 5.63 Communications tpgxyz@gmail.com
OpenMandriva Cooker
main/release
bluez 5.64 Communications tpgxyz@gmail.com
openSUSE Leap 42.3
updates/oss
bluez 5.41 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 42.3
main/oss
bluez 5.41 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
main/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.0
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.1
main/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.2
main/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.2
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.2
updates/oss
bluez 5.48 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.3
main/oss
bluez 5.55 Potentially vulnerable Hardware/Mobile -
openSUSE Leap 15.4
main/oss
bluez 5.62 Potentially vulnerable Hardware/Mobile -
openSUSE Tumbleweed
src-oss
bluez 5.64 Hardware/Mobile -
OpenWrt 17.01 x86_64
packages
bluez-libs 5.38 Potentially vulnerable libs nico@openwrt.org
OpenWrt 17.01 x86_64
packages
bluez-utils 5.38 Potentially vulnerable utils nico@openwrt.org
OpenWrt 17.01 x86_64
packages
bluez-daemon 5.38 Potentially vulnerable utils nico@openwrt.org
OpenWrt 17.01 x86_64
packages
bluez-examples 5.38 Potentially vulnerable utils nico@openwrt.org
OpenWrt 18.06 x86_64
packages
bluez-daemon 5.49 Potentially vulnerable utils nico@openwrt.org
OpenWrt 18.06 x86_64
packages
bluez-examples 5.49 Potentially vulnerable utils nico@openwrt.org
OpenWrt 18.06 x86_64
packages
bluez-libs 5.49 Potentially vulnerable libs nico@openwrt.org
OpenWrt 18.06 x86_64
packages
bluez-utils 5.49 Potentially vulnerable utils nico@openwrt.org
OpenWrt 19.07 x86_64
packages
bluez-daemon 5.50 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
packages
bluez-libs 5.50 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
packages
bluez-utils 5.50 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
bluez-daemon 5.64 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
bluez-libs 5.64 libs fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
bluez-utils-extra 5.64 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
bluez-utils 5.64 utils fallback-mnt-openwrt@repology
Parabola
extra
bluez-utils 5.64 - -
Parabola
extra
bluez 5.64 - -
Parabola
extra
bluez-hid2hci 5.64 - -
Parabola
extra
bluez-cups 5.64 - -
Parabola
extra
bluez-libs 5.64 - -
Parabola
extra
bluez-plugins 5.64 - -
Pardus 17
main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Pardus 17
updates/main
bluez 5.43 Potentially vulnerable admin pkg-bluetooth-maintainers@lists.alioth.debian.org, iwamatsu@debian.org
Pardus 19
main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Pardus 19
updates/main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Pardus 21
main
bluez 5.55 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Parrot
parrot-updates/main
bluez 5.61 Potentially vulnerable admin team@parrotsec.org, arnaudr@kali.org, re4son@kali.org
Parrot
parrot/main
bluez 5.61 Potentially vulnerable admin team@parrotsec.org, arnaudr@kali.org, re4son@kali.org
PCLinuxOS bluez 5.64 Communications -
Pisi Linux
main
bluez 5.62 Potentially vulnerable service muscnsl@gmail.com
PLD Linux bluez 5.64 - -
PureOS Amber bluez 5.50 Potentially vulnerable misc team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
PureOS Amber bluez 5.50 Potentially vulnerable misc team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
PureOS landing bluez 5.55 Potentially vulnerable misc team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Raspbian Oldstable
main
bluez 5.50 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Raspbian Stable
main
bluez 5.55 Potentially vulnerable admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Raspbian Testing
main
bluez 5.64 admin team+pkg-bluetooth@tracker.debian.org, iwamatsu@debian.org
Rocky Linux 8
BaseOS
bluez 5.56 Potentially vulnerable Unspecified infrastructure@rockylinux.org
Rosa 2014.1
main/updates
bluez 5.36 Potentially vulnerable - -
Rosa 2014.1
main/release
bluez 5.21 Potentially vulnerable - -
Rosa 2016.1
main/testing
bluez 5.55 Potentially vulnerable - -
Rosa 2016.1
main/updates
bluez 5.55 Potentially vulnerable - -
Rosa 2016.1
main/testing
bluez 5.50 Potentially vulnerable - -
Rosa 2016.1
main/testing
bluez 5.50 Potentially vulnerable - -
Rosa 2016.1
main/release
bluez 5.44 Potentially vulnerable - -
Rosa 2019.1
main/release
bluez 5.61 Potentially vulnerable Communications alexander@mezon.ru
Rosa Server 6.9
base/release
bluez 4.66 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/updates
bluez 4.66 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
bluez 5.41 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
bluez 5.44 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
bluez 5.41 Potentially vulnerable Applications/System alex2048@mail.ru
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.44 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.41 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 5.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 4.101 Potentially vulnerable Applications/System -
Scientific Linux 7.x bluez 4.101 Potentially vulnerable Applications/System -
Slackware 14.2
patches
bluez 5.47 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
bluez 5.40 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
bluez 5.64 - volkerdi@slackware.com
Slackware 15.0
slackware
bluez 5.63 - volkerdi@slackware.com
Slackware current
slackware
bluez 5.64 - volkerdi@slackware.com
Slackware64 14.2
patches
bluez 5.47 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
bluez 5.40 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
bluez 5.64 - volkerdi@slackware.com
Slackware64 15.0
slackware64
bluez 5.63 - volkerdi@slackware.com
Slackware64 current
slackware64
bluez 5.64 - volkerdi@slackware.com
Slackwarearm 14.2
patches
bluez 5.47 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
bluez 5.40 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
patches
bluez 5.64 - volkerdi@slackware.com
Slackwarearm 15.0
slackware
bluez 5.63 - volkerdi@slackware.com
SliTaz Cooking bluez 5.54 Potentially vulnerable system-tools pankso@slitaz.org
SliTaz Cooking bluez-dev 5.54 Potentially vulnerable development pankso@slitaz.org
SliTaz Next bluez-tools 5.48 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Next bluez-tools-experimental 5.48 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Next bluez 5.48 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Next bluez-dev 5.48 Potentially vulnerable development devel@slitaz.org
Solus bluez 5.64 system.utils josephriches@gmail.com
Solus bluez-dbginfo 5.64 debug josephriches@gmail.com
Solus bluez-devel 5.64 programming.devel josephriches@gmail.com
T2 SDE bluez 5.62 Potentially vulnerable extra/tool baldzius@gmail.com
Trisquel 6.0
toutatis-updates/main
bluez 4.98 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 6.0
toutatis/main
bluez 4.98 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 7.0
belenos/main
bluez 4.101 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 7.0
belenos-updates/main
bluez 4.101 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 8.0
flidas-updates/main
bluez 5.37 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 8.0
flidas/main
bluez 5.37 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 9.0
etiona/main
bluez 5.48 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 9.0
etiona-updates/main
bluez 5.48 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 10.0
nabia-updates/main
bluez 5.53 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Trisquel 10.0
nabia/main
bluez 5.53 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 14.04
trusty/main
bluez 4.101 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 14.04
trusty-updates/main
bluez 4.101 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 16.04
xenial-updates/main
bluez 5.37 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 16.04
xenial/main
bluez 5.37 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 18.04
bionic-updates/main
bluez 5.48 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 18.04
bionic/main
bluez 5.48 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 20.04
focal/main
bluez 5.53 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 20.04
focal-updates/main
bluez 5.53 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 21.04
hirsute-updates/main
bluez 5.56 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 21.04
hirsute/main
bluez 5.56 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 21.10
impish-updates/main
bluez 5.60 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 21.10
impish/main
bluez 5.60 Potentially vulnerable admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Ubuntu 22.04
jammy/main
bluez 5.64 admin ubuntu-bluetooth@lists.ubuntu.com, iwamatsu@debian.org
Void Linux x86_64
x86_64
bluez 5.64 - ericonr@disroot.org
Void Linux x86_64
x86_64
bluez-cups 5.64 - ericonr@disroot.org
Void Linux x86_64
x86_64
bluez-deprecated 5.64 - ericonr@disroot.org
Void Linux x86_64
x86_64
libbluetooth 5.64 - ericonr@disroot.org
Void Linux x86_64
x86_64
libbluetooth-devel 5.64 - ericonr@disroot.org
Wikidata BlueZ 5.64 - -
yiffOS Knot bluez 5.64 - evie@uwueviee.live