Versions Packages Information History CVEs Related Badges Report

Versions for bind

480 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
bind-libs 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-dbg 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-openrc 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-doc 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-dev 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-tools 9.14.12 Potentially vulnerable - djt@hxx.in
Alpine Linux 3.8
main
bind-doc 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-tools 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
py3-bind 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-dev 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-libs 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-dnssec-tools 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-openrc 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-dev 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-dnssec-tools 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
py3-bind 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-doc 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-openrc 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-libs 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-tools 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bind-libs 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-openrc 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-dnssec-tools 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-doc 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-dnssec-root 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-plugins 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-dev 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-tools 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
py3-bind 9.14.12 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.11
main
bind-dnssec-root 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-openrc 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-tools 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-libs 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-doc 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
py3-bind 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-dev 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-dnssec-tools 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-plugins 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-plugins 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-dev 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
py3-bind 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-openrc 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-dnssec-tools 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-doc 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-libs 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-tools 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-dnssec-root 9.14.12 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-dnssec-tools 9.16.5 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-dnssec-root 9.16.5 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-plugins 9.16.5 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-tools 9.16.5 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-dev 9.16.5 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-doc 9.16.5 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-libs 9.16.5 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind 9.16.5 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
py3-bind 9.16.5 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-openrc 9.16.5 - fallback-mnt-alpine@repology
ALT Linux p9 bind 9.11.19 Potentially vulnerable System/Servers slev@altlinux.org
ALT Sisyphus bind 9.11.20 System/Servers slev@altlinux.org
Amazon Linux 1
main
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
AOSC bind 9.16.3 Potentially vulnerable net fallback-mnt-aosc@repology
Arch
extra
bind 9.16.5 - -
AUR bind-rl 9.16.3 Potentially vulnerable - astroprofundis@aur
AUR bind-rl-tools 9.16.3 Potentially vulnerable - astroprofundis@aur
Astra Orel Stable
main
bind9 9.11.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Astra Orel Current
main
bind9 9.11.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Ataraxia Linux bind 9.16.5 net nagakamira@gmail.com
BlackArch bind 9.16.5 - -
Calculate net-dns/bind 9.14.8 Potentially vulnerable net-dns fallback-mnt-calculate@repology
Calculate net-dns/bind 9.11.2_p1 Potentially vulnerable net-dns fallback-mnt-calculate@repology
CentOS 6
os
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
CentOS 6
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
CentOS 6
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
CentOS 6
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
CentOS 7
os
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 7
updates
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 7
updates
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 7
updates
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 8
AppStream
bind 9.11.4 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
bind 9.11.4 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
bind 9.11.4 Potentially vulnerable Unspecified bugs@centos.org
Chocolatey BIND Tools 9.14.2 Potentially vulnerable - -
CRUX 3.4
contrib
bind 9.14.2 Potentially vulnerable - tek@serverop.de
CRUX 3.4
core
bindutils 9.12.4 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
contrib
bind 9.16.5 - tek@serverop.de
CRUX 3.5
core
bindutils 9.14.12 Potentially vulnerable - core-ports@crux.nu
Cygwin libisccc160 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin bind 9.11.9 Potentially vulnerable Net yaakov.selkowitz@cygwin
Cygwin bind-debuginfo 9.11.9 Potentially vulnerable Debug yaakov.selkowitz@cygwin
Cygwin bind-doc 9.11.9 Potentially vulnerable Doc yaakov.selkowitz@cygwin
Cygwin bind-utils 9.11.9 Potentially vulnerable Net yaakov.selkowitz@cygwin
Cygwin libbind9-devel 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libbind9_140 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libbind9_160 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libbind9_161 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libdns1104 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libdns1105 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libdns1106 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libdns165 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libdns166 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libdns169 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libirs141 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libirs160 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libirs161 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libisc1100 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libisc160 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libisc166 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libisccc140 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libisccc161 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libisccfg140 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libisccfg160 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libisccfg163 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin liblwres141 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin liblwres160 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin liblwres161 9.11.9 Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin python27-isc 9.11.9 Potentially vulnerable Python yaakov.selkowitz@cygwin
Cygwin python36-isc 9.11.9 Potentially vulnerable Python yaakov.selkowitz@cygwin
Cygwin python37-isc 9.11.9 Potentially vulnerable Python yaakov.selkowitz@cygwin
Debian Oldstable
oldstable/main
bind9 9.10.3 Potentially vulnerable net pkg-dns-devel@lists.alioth.debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Debian Stable
stable/main
bind9 9.11.5.P4 Potentially vulnerable net team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Debian Testing
testing/main
bind9 9.16.4 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Debian Unstable
main
bind9 9.16.4 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Debian Experimental
main
bind 9.13.3 Potentially vulnerable misc bind@packages.debian.org, berni@debian.org, ondrej@debian.org
Deepin
main
bind9 9.11.3 Potentially vulnerable net pkg-dns-devel@lists.alioth.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Devuan 1.0 (Jessie)
jessie/main
bind9 9.9.5 Potentially vulnerable net lamont@debian.org, mgilbert@debian.org
Devuan 2.0 (ASCII)
ascii/main
bind9 9.10.3 Potentially vulnerable net pkg-dns-devel@lists.alioth.debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Devuan 3.0 (Beowulf)
beowulf/main
bind9 9.11.5.P4 Potentially vulnerable net team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Devuan 4.0 (Chimaera)
chimaera/main
bind9 9.16.4 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Devuan Unstable
unstable/main
bind9 9.16.4 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
distri bind 9.14.1 Potentially vulnerable - -
DistroWatch.com bind 9.17.3 - -
DPorts dns/bind9-devel 9.17.0.a0.2020.06.06 dns mat@freebsd.org
DPorts dns/bind-tools 9.16.3 Potentially vulnerable dns mat@freebsd.org
DPorts dns/bind916 9.16.3 Potentially vulnerable dns mat@freebsd.org
DPorts dns/samba-nsupdate 9.14.2 Potentially vulnerable dns timur@freebsd.org
DPorts dns/bind911 9.11.19 Potentially vulnerable dns mat@freebsd.org
Entware
armv5sf-k3.2
bind-rndc 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-server 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-server-filter-aaaa 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-tools 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k2.6
bind-check 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k2.6
bind-client 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k2.6
bind-server-filter-aaaa 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-libs 9.16.3 Potentially vulnerable libs frodo@morgul.net
Entware
armv7sf-k2.6
bind-tools 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-check 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-client 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-nslookup 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-check 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-client 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-dig 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-dnssec 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-host 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-libs 9.16.3 Potentially vulnerable libs frodo@morgul.net
Entware
aarch64-k3.10
bind-nslookup 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-rndc 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-server 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-server-filter-aaaa 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
aarch64-k3.10
bind-tools 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-check 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-client 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-dig 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-dnssec 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv5sf-k3.2
bind-host 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k2.6
bind-dig 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k2.6
bind-dnssec 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k2.6
bind-host 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k2.6
bind-libs 9.16.3 Potentially vulnerable libs frodo@morgul.net
Entware
armv7sf-k2.6
bind-nslookup 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k2.6
bind-rndc 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k2.6
bind-server 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-dig 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-dnssec 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-host 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-libs 9.16.3 Potentially vulnerable libs frodo@morgul.net
Entware
armv7sf-k3.2
bind-nslookup 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-rndc 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-server 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-server-filter-aaaa 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
armv7sf-k3.2
bind-tools 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-check 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-client 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-dig 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-dnssec 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-host 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-libs 9.16.3 Potentially vulnerable libs frodo@morgul.net
Entware
mipselsf-k3.4
bind-nslookup 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-rndc 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-server 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-server-filter-aaaa 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipselsf-k3.4
bind-tools 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-check 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-client 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-dig 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-dnssec 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-host 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-libs 9.16.3 Potentially vulnerable libs frodo@morgul.net
Entware
mipssf-k3.4
bind-nslookup 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-rndc 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-server 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-server-filter-aaaa 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
mipssf-k3.4
bind-tools 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-check 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-client 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-dig 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-dnssec 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-host 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-libs 9.16.3 Potentially vulnerable libs frodo@morgul.net
Entware
x64-k3.2
bind-nslookup 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-rndc 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-server 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-server-filter-aaaa 9.16.3 Potentially vulnerable net frodo@morgul.net
Entware
x64-k3.2
bind-tools 9.16.3 Potentially vulnerable net frodo@morgul.net
Exherbo
arbor
net-dns/bind-tools 9.16.5 net-dns fallback-mnt-exherbo@repology
Exherbo
arbor
net-dns/bind 9.16.5 net-dns fallback-mnt-exherbo@repology
Fedora 26
updates
bind 9.11.2 Potentially vulnerable System Environment/Daemons -
Fedora 26
release
bind 9.11.1 Potentially vulnerable System Environment/Daemons -
Fedora 26
updates
bind99 9.9.10 Potentially vulnerable Applications/System -
Fedora 26
release
bind99 9.9.9 Potentially vulnerable Applications/System -
Fedora 27
updates
bind 9.11.4 Potentially vulnerable System Environment/Daemons -
Fedora 27
release
bind 9.11.1 Potentially vulnerable System Environment/Daemons -
Fedora 27
release
bind99 9.9.11 Potentially vulnerable Applications/System -
Fedora 27
updates
bind99 9.9.11 Potentially vulnerable Applications/System -
Fedora 28
updates
bind 9.11.4 Potentially vulnerable Unspecified -
Fedora 28
release
bind 9.11.3 Potentially vulnerable Unspecified -
Fedora 28
release
bind99 9.9.11 Potentially vulnerable Applications/System -
Fedora 29
updates
bind 9.11.10 Potentially vulnerable Unspecified -
Fedora 29
release
bind 9.11.4 Potentially vulnerable Unspecified -
Fedora 30
updates
bind 9.11.14 Potentially vulnerable Unspecified -
Fedora 30
release
bind 9.11.5 Potentially vulnerable Unspecified -
Fedora 31
updates
bind 9.11.21 Unspecified -
Fedora 31
release
bind 9.11.11 Potentially vulnerable Unspecified -
Fedora 32
updates
bind 9.11.21 Unspecified -
Fedora 32
release
bind 9.11.17 Potentially vulnerable Unspecified -
Fedora Rawhide bind 9.11.21 Unspecified -
FreeBSD Ports dns/bind9-devel 9.17.3.a0.2020.07.31 dns mat@freebsd.org
FreeBSD Ports dns/bind-tools 9.16.5 dns mat@freebsd.org
FreeBSD Ports dns/bind916 9.16.5 dns mat@freebsd.org
FreeBSD Ports dns/samba-nsupdate 9.14.2 Potentially vulnerable dns timur@freebsd.org
FreeBSD Ports dns/bind911 9.11.21 dns mat@freebsd.org
Funtoo 1.4
net-kit
net-dns/bind 9.15.4 Potentially vulnerable net-dns idl0r@gentoo.org
Funtoo 1.4
net-kit
net-dns/bind 9.14.6 Potentially vulnerable net-dns idl0r@gentoo.org
Funtoo 1.4
core-kit
net-dns/bind-tools 9.12.3_p4 Potentially vulnerable net-dns idl0r@gentoo.org
Gentoo net-dns/bind-tools 9.16.5 net-dns idl0r@gentoo.org, zlogene@gentoo.org
Gentoo net-dns/bind 9.16.5 net-dns idl0r@gentoo.org, zlogene@gentoo.org
Gentoo net-dns/bind-tools 9.16.4 net-dns idl0r@gentoo.org, zlogene@gentoo.org
Gentoo net-dns/bind 9.16.4 net-dns idl0r@gentoo.org, zlogene@gentoo.org
Gentoo net-dns/bind-tools 9.14.12 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
Gentoo net-dns/bind 9.14.12 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
GNU Guix bind 9.16.5 - -
GoboLinux Bind 9.11.1 Potentially vulnerable - -
Homebrew bind 9.16.5 - -
HP-UX 11.31
hppa_32
dig 2.0 Potentially vulnerable - -
HP-UX 11.31
ia64_32
dig 2.0 Potentially vulnerable - -
Hyperbola
extra
bind 9.11.5 Potentially vulnerable - -
Hyperbola
extra
bind-tools 9.11.5 Potentially vulnerable - -
Kali Linux Rolling
main
bind9 9.16.4 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
KaOS
core
dnsutils 9.16.5 - demm@kaosx.us
KISS Linux Community
community
bind 9.17.2 - ax@slackware.eu
Kwort 4.3.2 bindutils 9.11.3 Potentially vulnerable - -
Kwort 4.3.3 bindutils 9.12.4 Potentially vulnerable - -
Kwort 4.3.4 bindutils 9.14.12 Potentially vulnerable - -
LiGurOS 20.1
core-kit
net-dns/bind-tools 9.16.4 net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.1
nokit
net-dns/bind 9.16.4 net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.1
core-kit
net-dns/bind-tools 9.16.3 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.1
nokit
net-dns/bind 9.16.3 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.1
core-kit
net-dns/bind-tools 9.14.12 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.1
nokit
net-dns/bind 9.14.12 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.7
core-kit
net-dns/bind-tools 9.16.5 net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.7
core-kit
net-dns/bind-tools 9.16.4 net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.7
nokit
net-dns/bind 9.16.4 net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.7
core-kit
net-dns/bind-tools 9.16.3 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.7
nokit
net-dns/bind 9.16.3 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.7
core-kit
net-dns/bind-tools 9.14.12 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
LiGurOS 20.7
nokit
net-dns/bind 9.14.12 Potentially vulnerable net-dns idl0r@gentoo.org, zlogene@gentoo.org
Linuxbrew bind 9.16.5 - -
MacPorts bind9 9.16.5 net danielluke@github
Mageia 6
core/updates
bind 9.10.8.P1 Potentially vulnerable System/Servers -
Mageia 6
core/updates
bind 9.10.6.P1 Potentially vulnerable System/Servers -
Mageia 6
core/updates
bind 9.10.5.P3 Potentially vulnerable System/Servers -
Mageia 6
core/release
bind 9.10.5.P2 Potentially vulnerable System/Servers -
Mageia 7
core/release
bind 9.11.6 Potentially vulnerable System/Servers -
Mageia 7
core/updates
bind 9.11.6 Potentially vulnerable System/Servers -
Mageia Cauldron
core/release
bind 9.11.20 System/Servers -
Manjaro Stable
extra
bind 9.16.4 - -
Manjaro Stable
extra
bind-tools 9.16.4 - -
Manjaro Testing
extra
bind 9.16.5 - -
Manjaro Unstable
extra
bind 9.16.5 - -
nixpkgs stable bind 9.14.12 Potentially vulnerable - simons@cryp.to, mail@glob.in
nixpkgs stable bind 9.14.12 Potentially vulnerable - simons@cryp.to, mail@glob.in
nixpkgs stable bind 9.14.12 Potentially vulnerable - simons@cryp.to, mail@glob.in
nixpkgs unstable bind 9.14.12 Potentially vulnerable - simons@cryp.to, mail@glob.in
nixpkgs unstable bind 9.14.12 Potentially vulnerable - simons@cryp.to, mail@glob.in
nixpkgs unstable bind 9.14.12 Potentially vulnerable - simons@cryp.to, mail@glob.in
openEuler 20.03
source
bind 9.11.4 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
bind 9.16.0 Potentially vulnerable Applications/Internet -
OpenIndiana packages
hipster
bind 9.16.0 Potentially vulnerable System/Services -
OpenMandriva 3.0
main/release
bind 9.9.8 Potentially vulnerable System/Servers tpgxyz@gmail.com
OpenMandriva 4.0
main/release
bind 9.15.0 Potentially vulnerable System/Servers bero@lindev.ch
OpenMandriva 4.0
main/release
bind 9.14.1 Potentially vulnerable System/Servers bero@lindev.ch
OpenMandriva 4.1
main/release
bind 9.15.8 System/Servers bero@lindev.ch
OpenMandriva Rolling
main/release
bind 9.15.8 System/Servers nobodydead@gmail.com
OpenMandriva Cooker
main/release
bind 9.15.8 System/Servers nobodydead@gmail.com
OpenPKG bind 9.16.5 DNS -
openSUSE Leap 42.3
main/oss
bind 9.9.9P1 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 42.3
updates/oss
bind 9.9.9P1 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
main/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.1
main/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.1
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.1
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
main/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Tumbleweed bind 9.16.5 Productivity/Networking/DNS/Servers -
openSUSE Network Tumbleweed bind 9.16.5 Productivity/Networking/DNS/Servers -
OpenWrt 17.01 x86_64
packages
bind-check 9.10.4 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-client 9.10.4 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-dig 9.10.4 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-dnssec 9.10.4 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-host 9.10.4 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-libs 9.10.4 Potentially vulnerable libs frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-rndc 9.10.4 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-server 9.10.4 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-tools 9.10.4 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-check 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-client 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-dig 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-dnssec 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-host 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-libs 9.11.19 Potentially vulnerable libs frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-rndc 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-server 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-tools 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-check 9.16.3 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-client 9.16.3 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-dig 9.16.3 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-dnssec 9.16.3 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-host 9.16.3 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-libs 9.16.3 Potentially vulnerable libs frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-nslookup 9.16.3 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-rndc 9.16.3 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-server-filter-aaaa 9.16.3 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-server 9.16.3 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-tools 9.16.3 Potentially vulnerable net frodo@morgul.net
Parabola
extra
bind 9.16.5 - -
Pardus
main
bind9 9.10.3 Potentially vulnerable net lamont@debian.org, mgilbert@debian.org, robie.basak@canonical.com
Pardus
updates/main
bind9 9.10.3 Potentially vulnerable net pkg-dns-devel@lists.alioth.debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Pardus
updates/main
bind9 9.10.3 Potentially vulnerable net lamont@debian.org, mgilbert@debian.org, robie.basak@canonical.com
Parrot
main
bind9 9.16.4 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
PCLinuxOS bind 9.10.8.P1 Potentially vulnerable System/Servers -
Pisi Linux
main
bind 9.14.9 Potentially vulnerable service admins@pisilinux.org
pkgsrc current net/bind914 9.14.12 Potentially vulnerable net pkgsrc-users@netbsd.org
pkgsrc current net/bind911 9.11.20 net pkgsrc-users@netbsd.org
PLD Linux bind 9.16.3 Potentially vulnerable - -
PureOS Amber bind9 9.11.5.P4 Potentially vulnerable misc team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
PureOS landing bind9 9.16.4 misc team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Raspbian Oldstable
main
bind9 9.10.3 Potentially vulnerable net pkg-dns-devel@lists.alioth.debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Raspbian Stable
main
bind9 9.11.5.P4 Potentially vulnerable net team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Raspbian Testing
main
bind9 9.16.4 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Ravenports bind 9.16.5 dns fallback-mnt-ravenports@repology
Rosa 2014.1
main/updates
bind 9.10.8.P1 Potentially vulnerable - -
Rosa 2014.1
main/release
bind 9.9.1 Potentially vulnerable - -
Rosa 2016.1
main/updates
bind 9.11.4.P1 Potentially vulnerable - -
Rosa 2016.1
main/release
bind 9.11.0.P2 Potentially vulnerable - -
Rosa 2019.1
main/release
bind 9.11.18 Potentially vulnerable System/Servers m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
bind 9.9.4 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
bind 9.9.4 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
bind 9.9.4 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scoop
main
bind 9.16.5 - -
Scoop
main
dig 9.14.8 Potentially vulnerable - -
Slackware 14.2
patches
bind 9.11.20 - volkerdi@slackware.com
Slackware 14.2
slackware
bind 9.10.4_P1 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
bind 9.16.5 - volkerdi@slackware.com
Slackware64 14.2
patches
bind 9.11.20 - volkerdi@slackware.com
Slackware64 14.2
slackware64
bind 9.10.4_P1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
bind 9.16.5 - volkerdi@slackware.com
Slackwarearm 14.2
patches
bind 9.11.20 - volkerdi@slackware.com
Slackwarearm 14.2
slackware
bind 9.10.4_P1 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
bind 9.16.5 - volkerdi@slackware.com
SliTaz Cooking bind 9.14.9 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Cooking bind-client 9.14.9 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Cooking bind-dev 9.14.9 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Cooking libbind 9.14.9 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next bind 9.12.3 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Next bind-client 9.12.3 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Next bind-lib 9.12.3 Potentially vulnerable libdevel pascal.bellard@slitaz.org
SliTaz Next bind-dev 9.12.3 Potentially vulnerable development pascal.bellard@slitaz.org
Solus bind-utils 9.11.5_p1 Potentially vulnerable network.util joshua@streambits.io
Solus bind-utils-dbginfo 9.11.5_p1 Potentially vulnerable debug joshua@streambits.io
T2 SDE bind 9.7.2-P3 Potentially vulnerable extra/server base/system rene@t2-project.org
Termux dnsutils 9.16.5 - termux@termux
Trisquel 6.0
toutatis/main
bind9 9.8.1 Potentially vulnerable net lamont@debian.org, bdale@gag.com
Trisquel 6.0
toutatis-updates/main
bind9 9.8.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, bdale@gag.com
Trisquel 7.0
belenos/main
bind9 9.9.5 Potentially vulnerable net lamont@debian.org, bdale@gag.com
Trisquel 7.0
belenos-updates/main
bind9 9.9.5 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, bdale@gag.com
Trisquel 8.0
flidas/main
bind9 9.10.3 Potentially vulnerable net lamont@debian.org, mgilbert@debian.org, robie.basak@canonical.com
Trisquel 8.0
flidas-updates/main
bind9 9.10.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, mgilbert@debian.org, robie.basak@canonical.com
Ubuntu 12.04
precise/main
bind9 9.8.1 Potentially vulnerable net lamont@debian.org, bdale@gag.com
Ubuntu 12.04
precise-updates/main
bind9 9.8.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, bdale@gag.com
Ubuntu 14.04
trusty/main
bind9 9.9.5 Potentially vulnerable net lamont@debian.org, bdale@gag.com
Ubuntu 14.04
trusty-updates/main
bind9 9.9.5 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, bdale@gag.com
Ubuntu 16.04
xenial/main
bind9 9.10.3 Potentially vulnerable net lamont@debian.org, mgilbert@debian.org, robie.basak@canonical.com
Ubuntu 16.04
xenial-updates/main
bind9 9.10.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, mgilbert@debian.org, robie.basak@canonical.com
Ubuntu 18.04
bionic/main
bind9 9.11.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Ubuntu 18.04
bionic-updates/main
bind9 9.11.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Ubuntu 19.10
eoan/main
bind9 9.11.5.P4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Ubuntu 19.10
eoan-updates/main
bind9 9.11.5.P4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Ubuntu 20.04
focal/main
bind9 9.16.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 20.04
focal-updates/main
bind9 9.16.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 20.10
groovy/main
bind9 9.16.4 net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 20.10 Proposed
groovy-proposed/main
bind9 9.16.4 net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Void Linux x86_64
x86_64
bind 9.16.5 - randy@mccaskill.us
Void Linux x86_64
x86_64
bind-devel 9.16.5 - randy@mccaskill.us
Void Linux x86_64
x86_64
bind-libs 9.16.5 - randy@mccaskill.us
Void Linux x86_64
x86_64
bind-utils 9.16.5 - randy@mccaskill.us
Wikidata BIND 9.15.5 Potentially vulnerable - -
Wikidata BIND 9.14.11 Potentially vulnerable - -

Absent in repositories

  • AIX Open Source Packages
  • antiX-16
  • antiX-17
  • antiX-19
  • AppGet
  • Arch Testing
  • BlackBox 6
  • BlackBox 7
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Carbs Linux
  • Chakra
  • Chakra Staging
  • Chakra Testing
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Deb Multimedia Unstable
  • Debian Stable Backports
  • ELRepo el7
  • ELRepo el7 Testing
  • EPEL 6
  • EPEL 7
  • EPEL 8
  • F-Droid
  • freshcode.club
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • GNU Elpa
  • Hackage
  • HaikuPorts master
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • IBM i
  • just-install
  • KaOS Build
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon Experimental
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Games
  • KISS Linux Main
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linux Mint 20.0
  • LuaRocks
  • Maemo Fremantle
  • MELPA
  • MSYS2 mingw
  • MSYS2 msys2
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable
  • Npackd Stable64
  • Npackd Unstable
  • OpenBSD Ports
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • Pisi Linux Contrib
  • ReactOS rapps
  • RebornOS
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Salix 14.2
  • Siduction
  • Siduction Experimental
  • SlackBuilds
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • Vcpkg
  • Whonix
  • Whonix Developers
  • winget
  • YACP