bluez security update with access control vulnerabilit
Reporter | Title | Published | Views | Family All 91 |
---|---|---|---|---|
![]() | bluez - security update | 26 Mar 202000:00 | – | osv |
![]() | RHSA-2020:4481 Red Hat Security Advisory: bluez security update | 16 Sep 202404:05 | – | osv |
![]() | CVE-2020-0556 | 12 Mar 202021:15 | – | osv |
![]() | bluez - security update | 9 Jun 202000:00 | – | osv |
![]() | RHSA-2020:4001 Red Hat Security Advisory: bluez security update | 16 Sep 202404:05 | – | osv |
![]() | RHEL 7 : bluez (RHSA-2020:4001) | 29 Sep 202000:00 | – | nessus |
![]() | EulerOS Virtualization 3.0.2.2 : bluez (EulerOS-SA-2020-2188) | 21 Oct 202000:00 | – | nessus |
![]() | CentOS 7 : bluez (RHSA-2020:4001) | 20 Oct 202000:00 | – | nessus |
![]() | SUSE SLES12 Security Update : bluez (SUSE-SU-2020:3516-1) | 9 Dec 202000:00 | – | nessus |
![]() | SUSE SLED15 / SLES15 Security Update : bluez (SUSE-SU-2020:0918-1) | 6 Apr 202000:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | ppc64 | bluez | 5.44-7.el7 | bluez-5.44-7.el7.ppc64.rpm |
RedHat | 7 | s390x | bluez-hid2hci | 5.44-7.el7 | bluez-hid2hci-5.44-7.el7.s390x.rpm |
RedHat | 7 | i686 | bluez-libs-devel | 5.44-7.el7 | bluez-libs-devel-5.44-7.el7.i686.rpm |
RedHat | 7 | ppc64le | bluez-hid2hci | 5.44-7.el7 | bluez-hid2hci-5.44-7.el7.ppc64le.rpm |
RedHat | 7 | ppc64le | bluez-debuginfo | 5.44-7.el7 | bluez-debuginfo-5.44-7.el7.ppc64le.rpm |
RedHat | 7 | ppc64 | bluez-libs-devel | 5.44-7.el7 | bluez-libs-devel-5.44-7.el7.ppc64.rpm |
RedHat | 7 | ppc64le | bluez | 5.44-7.el7 | bluez-5.44-7.el7.ppc64le.rpm |
RedHat | 7 | s390x | bluez-libs-devel | 5.44-7.el7 | bluez-libs-devel-5.44-7.el7.s390x.rpm |
RedHat | 7 | x86_64 | bluez-libs | 5.44-7.el7 | bluez-libs-5.44-7.el7.x86_64.rpm |
RedHat | 7 | ppc64 | bluez-hid2hci | 5.44-7.el7 | bluez-hid2hci-5.44-7.el7.ppc64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo