Low severity bluez security update with Bluetooth utilitie
Reporter | Title | Published | Views | Family All 29 |
---|---|---|---|---|
![]() | (RHSA-2020:1101) Low: bluez security update | 31 Mar 202009:18 | – | redhat |
![]() | Authentication flaw | 28 Jan 201915:29 | – | prion |
![]() | GNOME Bluetooth vulnerability | 14 Jan 201900:00 | – | ubuntu |
![]() | CVE-2018-10910 | 28 Jan 201915:00 | – | cvelist |
![]() | bluez security update | 5 May 202000:00 | – | oraclelinux |
![]() | bluez security update | 6 Apr 202000:00 | – | oraclelinux |
![]() | CVE-2018-10910 | 28 Jan 201915:29 | – | osv |
![]() | RHSA-2020:1101 Red Hat Security Advisory: bluez security update | 16 Sep 202402:51 | – | osv |
![]() | RHSA-2020:1912 Red Hat Security Advisory: bluez security update | 16 Sep 202402:51 | – | osv |
![]() | Authorization Bypass | 1 Apr 202000:38 | – | veracode |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | aarch64 | bluez-obexd-debuginfo | 5.50-3.el8 | bluez-obexd-debuginfo-5.50-3.el8.aarch64.rpm |
RedHat | 8 | i686 | bluez-libs-debuginfo | 5.50-3.el8 | bluez-libs-debuginfo-5.50-3.el8.i686.rpm |
RedHat | 8 | x86_64 | bluez-obexd-debuginfo | 5.50-3.el8 | bluez-obexd-debuginfo-5.50-3.el8.x86_64.rpm |
RedHat | 8 | s390x | bluez-libs-devel | 5.50-3.el8 | bluez-libs-devel-5.50-3.el8.s390x.rpm |
RedHat | 8 | i686 | bluez-hid2hci-debuginfo | 5.50-3.el8 | bluez-hid2hci-debuginfo-5.50-3.el8.i686.rpm |
RedHat | 8 | aarch64 | bluez-libs-devel | 5.50-3.el8 | bluez-libs-devel-5.50-3.el8.aarch64.rpm |
RedHat | 8 | x86_64 | bluez-debuginfo | 5.50-3.el8 | bluez-debuginfo-5.50-3.el8.x86_64.rpm |
RedHat | 8 | aarch64 | bluez-hid2hci | 5.50-3.el8 | bluez-hid2hci-5.50-3.el8.aarch64.rpm |
RedHat | 8 | aarch64 | bluez-libs | 5.50-3.el8 | bluez-libs-5.50-3.el8.aarch64.rpm |
RedHat | 8 | s390x | bluez-debugsource | 5.50-3.el8 | bluez-debugsource-5.50-3.el8.s390x.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo