Versions Packages Information History CVEs Related Badges Report

Versions for bind

609 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
bind-openrc 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-dev 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-tools 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-libs 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-dev 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-openrc 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-libs 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-doc 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-tools 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-dbg 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-dbg 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-doc 9.16.8 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-dbg 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-doc 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-tools 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-libs 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-dev 9.14.12 Potentially vulnerable - djt@hxx.in
Adélie Linux current
user
bind-openrc 9.14.12 Potentially vulnerable - djt@hxx.in
AIX Toolbox bind 9.14.5 Potentially vulnerable System Environment/Daemons -
AIX Toolbox bind 9.14.5 Potentially vulnerable System Environment/Daemons -
AIX Toolbox bind 9.12.2 Potentially vulnerable System Environment/Daemons -
AIX Toolbox bind 9.11.2 Potentially vulnerable System Environment/Daemons -
AlmaLinux 8
BaseOS
bind 9.11.26 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
bind-libs 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-openrc 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-dnssec-tools 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-dev 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
py3-bind 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-doc 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
bind-tools 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-dev 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-dnssec-tools 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
py3-bind 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-doc 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-openrc 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-libs 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
bind-tools 9.12.4_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
bind-dnssec-tools 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-tools 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-dev 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-libs 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-plugins 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
py3-bind 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-doc 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-openrc 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.10
main
bind-dnssec-root 9.16.15 Potentially vulnerable - bind+aports@tcely.33mail.com
Alpine Linux 3.11
main
bind-dnssec-tools 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-openrc 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-libs 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-plugins 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-dev 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-dnssec-root 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-doc 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
bind-tools 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
py3-bind 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
py3-bind 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-dnssec-root 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-libs 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-tools 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-doc 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-plugins 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-openrc 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-dnssec-tools 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.12
main
bind-dev 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
bind-dnssec-root 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
py3-bind 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
bind-tools 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
bind-libs 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
bind-plugins 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
bind-dnssec-tools 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
bind-dev 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
bind-openrc 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
bind 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.13
main
bind-doc 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
bind-tools 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
bind-openrc 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
bind-doc 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
bind-libs 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
bind-dev 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
bind-dnssec-tools 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
bind-dnssec-root 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
bind 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
py3-bind 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.14
main
bind-plugins 9.16.20 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind-libs 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind-plugins 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind-dnssec-tools 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind-dnssec-root 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind-openrc 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind-tools 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
py3-bind 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind-dbg 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind-dev 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux 3.15
main
bind-doc 9.16.22 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-dnssec-root 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-tools 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-dnssec-tools 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-plugins 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-libs 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
py3-bind 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-openrc 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-doc 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-dbg 9.16.24 - fallback-mnt-alpine@repology
Alpine Linux Edge
main
bind-dev 9.16.24 - fallback-mnt-alpine@repology
ALT Linux p9 bind 9.11.36 System/Servers slev@altlinux.org
ALT Linux p10 bind 9.11.36 System/Servers slev@altlinux.org
ALT Sisyphus bind 9.11.36 System/Servers slev@altlinux.org
Amazon Linux 1
main
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.11.4 Potentially vulnerable Unspecified -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 bind 9.9.4 Potentially vulnerable System Environment/Daemons -
AOSC bind 9.16.21 Potentially vulnerable net fallback-mnt-aosc@repology
Apertis v2020
v2020/target
bind9 9.11.5.P4 Potentially vulnerable main team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Apertis v2021
v2021/target
bind9 9.11.5.P4 Potentially vulnerable main team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Apertis v2022 Development
v2022dev2/target
bind9 9.16.13 Potentially vulnerable main team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Arch
extra
bind 9.16.25 - -
AUR bind-git 9.main.r34613.ba181fe83d - pspacek@aur
AUR bind-rl 9.16.3 Potentially vulnerable - fallback-mnt-aur@repology
AUR bind-rl-tools 9.16.3 Potentially vulnerable - fallback-mnt-aur@repology
Artix
world
bind 9.16.25 - -
Astra Orel Stable
main
bind9 9.11.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Ataraxia GNU/Linux bind 9.16.16 Potentially vulnerable net nagakamira@gmail.com
Baulk bind 9.16.25 - -
BlackArch bind 9.16.25 - -
Calculate net-dns/bind 9.16.22 net-dns fallback-mnt-calculate@repology
CentOS 6
os
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
CentOS 6
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
CentOS 6
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
CentOS 6
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
CentOS 6
updates
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons -
CentOS 7
os
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 7
updates
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 7
updates
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 7
updates
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 7
updates
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 7
updates
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 7
updates
bind 9.11.4 Potentially vulnerable Unspecified -
CentOS 8
BaseOS
bind 9.11.26 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
bind 9.11.26 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8 Stream
BaseOS
bind 9.11.26 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8 Stream
BaseOS
bind 9.11.26 Potentially vulnerable Unspecified bugs@centos.org
Chocolatey BIND Tools 9.14.2 Potentially vulnerable - -
CRUX 3.4
contrib
bind 9.14.2 Potentially vulnerable - tek@serverop.de
CRUX 3.4
core
bindutils 9.12.4 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
contrib
bind 9.16.9 Potentially vulnerable - tek@serverop.de
CRUX 3.5
core
bindutils 9.14.12 Potentially vulnerable - core-ports@crux.nu
CRUX 3.6
opt
bindutils 9.16.25 - core-ports@crux.nu
Cygwin libirs141 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin python37-isc 9.11.9 Potentially vulnerable Python orphaned@cygwin
Cygwin libbind9-devel 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin python27-isc 9.11.9 Potentially vulnerable Python orphaned@cygwin
Cygwin liblwres161 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin python36-isc 9.11.9 Potentially vulnerable Python orphaned@cygwin
Cygwin bind-utils 9.11.9 Potentially vulnerable Net orphaned@cygwin
Cygwin libbind9_140 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libbind9_160 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libbind9_161 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libdns1104 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libdns1105 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libdns1106 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libdns165 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libdns166 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libdns169 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libirs160 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libirs161 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libisc1100 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libisc160 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libisc166 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libisccc140 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libisccc160 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libisccc161 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libisccfg140 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libisccfg160 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin libisccfg163 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin liblwres141 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin liblwres160 9.11.9 Potentially vulnerable Libs orphaned@cygwin
Cygwin bind 9.11.9 Potentially vulnerable Net orphaned@cygwin
Cygwin bind-debuginfo 9.11.9 Potentially vulnerable Debug orphaned@cygwin
Cygwin bind-doc 9.11.9 Potentially vulnerable Doc orphaned@cygwin
Debian 8
jessie/main
bind9 9.9.5.dfsg Potentially vulnerable net lamont@debian.org, mgilbert@debian.org
Debian 9
stretch/main
bind9 9.10.3.dfsg.P4 Potentially vulnerable net pkg-dns-devel@lists.alioth.debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Debian 9 Backports
stretch-backports/main
bind9 9.11.5.P4 Potentially vulnerable misc team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Debian 10
buster/main
bind9 9.11.5.P4 Potentially vulnerable net team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Debian 10 Backports
buster-backports/main
bind9 9.16.22 misc team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Debian 11
bullseye/main
bind9 9.16.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Debian 12
bookworm/main
bind9 9.17.21 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Debian Unstable
sid/main
bind9 9.17.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Deepin
main
bind9 9.11.5.P4 Potentially vulnerable - team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Devuan 1.0
jessie/main
bind9 9.9.5.dfsg Potentially vulnerable net lamont@debian.org, mgilbert@debian.org
Devuan 2.0
ascii/main
bind9 9.10.3.dfsg.P4 Potentially vulnerable net pkg-dns-devel@lists.alioth.debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Devuan 3.0
beowulf/main
bind9 9.11.5.P4 Potentially vulnerable net team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Devuan 4.0
chimaera/main
bind9 9.16.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Devuan Unstable
unstable/main
bind9 9.17.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
distri bind 9.14.1 Potentially vulnerable - -
DistroWatch.com bind 9.16.25 - -
DPorts dns/bind9-devel 9.17.18.a0.2021.09.24 Potentially vulnerable dns mat@freebsd.org
DPorts dns/bind-tools 9.16.24 dns mat@freebsd.org
DPorts dns/bind916 9.16.24 dns mat@freebsd.org
DPorts dns/samba-nsupdate 9.16.5 Potentially vulnerable dns timur@freebsd.org
DPorts dns/bind911 9.11.36 dns mat@freebsd.org
Entware
x64-k3.2
bind-client 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-dig 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-dnssec 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-host 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-libs 9.17.20 libs frodo@morgul.net
Entware
armv7sf-k3.2
bind-libs 9.17.20 libs frodo@morgul.net
Entware
armv7sf-k2.6
bind-check 9.17.20 net frodo@morgul.net
Entware
armv7sf-k2.6
bind-client 9.17.20 net frodo@morgul.net
Entware
armv7sf-k2.6
bind-dig 9.17.20 net frodo@morgul.net
Entware
armv7sf-k2.6
bind-dnssec 9.17.20 net frodo@morgul.net
Entware
armv7sf-k2.6
bind-host 9.17.20 net frodo@morgul.net
Entware
armv7sf-k2.6
bind-libs 9.17.20 libs frodo@morgul.net
Entware
armv7sf-k2.6
bind-nslookup 9.17.20 net frodo@morgul.net
Entware
armv7sf-k2.6
bind-rndc 9.17.20 net frodo@morgul.net
Entware
armv7sf-k2.6
bind-server 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-nslookup 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-rndc 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-server 9.17.20 net frodo@morgul.net
Entware
armv7sf-k2.6
bind-server-filter-aaaa 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-server-filter-aaaa 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-tools 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-check 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-client 9.17.20 net frodo@morgul.net
Entware
armv7sf-k2.6
bind-tools 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-check 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-client 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-dig 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-dnssec 9.17.20 net frodo@morgul.net
Entware
armv7sf-k3.2
bind-check 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-host 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-libs 9.17.20 libs frodo@morgul.net
Entware
mipselsf-k3.4
bind-nslookup 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-rndc 9.17.20 net frodo@morgul.net
Entware
armv7sf-k3.2
bind-client 9.17.20 net frodo@morgul.net
Entware
armv7sf-k3.2
bind-dig 9.17.20 net frodo@morgul.net
Entware
armv7sf-k3.2
bind-dnssec 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-server 9.17.20 net frodo@morgul.net
Entware
armv7sf-k3.2
bind-nslookup 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-dig 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-server-filter-aaaa 9.17.20 net frodo@morgul.net
Entware
mipselsf-k3.4
bind-tools 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-check 9.17.20 net frodo@morgul.net
Entware
armv7sf-k3.2
bind-rndc 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-client 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-dig 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-dnssec 9.17.20 net frodo@morgul.net
Entware
armv7sf-k3.2
bind-server 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-host 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-libs 9.17.20 libs frodo@morgul.net
Entware
armv7sf-k3.2
bind-server-filter-aaaa 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-nslookup 9.17.20 net frodo@morgul.net
Entware
armv7sf-k3.2
bind-tools 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-rndc 9.17.20 net frodo@morgul.net
Entware
armv7sf-k3.2
bind-host 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-server 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-server-filter-aaaa 9.17.20 net frodo@morgul.net
Entware
mipssf-k3.4
bind-tools 9.17.20 net frodo@morgul.net
Entware
x64-k3.2
bind-check 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-tools 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-dnssec 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-host 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-libs 9.17.20 libs frodo@morgul.net
Entware
aarch64-k3.10
bind-nslookup 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-rndc 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-server 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-server-filter-aaaa 9.17.20 net frodo@morgul.net
Entware
aarch64-k3.10
bind-tools 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-check 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-client 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-dig 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-dnssec 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-host 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-libs 9.17.20 libs frodo@morgul.net
Entware
armv5sf-k3.2
bind-nslookup 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-rndc 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-server 9.17.20 net frodo@morgul.net
Entware
armv5sf-k3.2
bind-server-filter-aaaa 9.17.20 net frodo@morgul.net
Exherbo
arbor
net-dns/bind 9.16.22 net-dns fallback-mnt-exherbo@repology
Exherbo
arbor
net-dns/bind-tools 9.16.22 net-dns fallback-mnt-exherbo@repology
Fedora 26
updates
bind 9.11.2 Potentially vulnerable System Environment/Daemons -
Fedora 26
release
bind 9.11.1 Potentially vulnerable System Environment/Daemons -
Fedora 26
updates
bind99 9.9.10 Potentially vulnerable Applications/System -
Fedora 26
release
bind99 9.9.9 Potentially vulnerable Applications/System -
Fedora 27
updates
bind 9.11.4 Potentially vulnerable System Environment/Daemons -
Fedora 27
release
bind 9.11.1 Potentially vulnerable System Environment/Daemons -
Fedora 27
updates
bind99 9.9.11 Potentially vulnerable Applications/System -
Fedora 27
release
bind99 9.9.11 Potentially vulnerable Applications/System -
Fedora 28
updates
bind 9.11.4 Potentially vulnerable Unspecified -
Fedora 28
release
bind 9.11.3 Potentially vulnerable Unspecified -
Fedora 28
release
bind99 9.9.11 Potentially vulnerable Applications/System -
Fedora 29
updates
bind 9.11.10 Potentially vulnerable Unspecified -
Fedora 29
release
bind 9.11.4 Potentially vulnerable Unspecified -
Fedora 30
updates
bind 9.11.14 Potentially vulnerable Unspecified -
Fedora 30
release
bind 9.11.5 Potentially vulnerable Unspecified -
Fedora 31
updates
bind 9.11.22 Potentially vulnerable Unspecified -
Fedora 31
release
bind 9.11.11 Potentially vulnerable Unspecified -
Fedora 32
updates
bind 9.11.28 Potentially vulnerable Unspecified -
Fedora 32
release
bind 9.11.17 Potentially vulnerable Unspecified -
Fedora 33
updates
bind 9.11.36 Unspecified -
Fedora 33
release
bind 9.11.23 Potentially vulnerable Unspecified -
Fedora 34
updates
bind 9.16.24 Unspecified -
Fedora 34
release
bind 9.16.11 Potentially vulnerable Unspecified -
Fedora 35
updates
bind 9.16.24 Unspecified -
Fedora 35
development
bind 9.16.21 Potentially vulnerable Unspecified -
Fedora Rawhide bind 9.16.24 Unspecified -
FreeBSD Ports dns/bind9-devel 9.17.18.a0.2021.10.08 Potentially vulnerable dns mat@freebsd.org
FreeBSD Ports dns/bind-tools 9.16.24 dns mat@freebsd.org
FreeBSD Ports dns/bind916 9.16.24 dns mat@freebsd.org
FreeBSD Ports dns/samba-nsupdate 9.16.5 Potentially vulnerable dns timur@freebsd.org
FreeBSD Ports dns/bind911 9.11.36 dns mat@freebsd.org
Funtoo 1.4
net-kit
net-dns/bind 9.16.25 net-dns fallback-mnt-funtoo@repology
Funtoo 1.4
core-kit
net-dns/bind-tools 9.12.3_p4 Potentially vulnerable net-dns idl0r@gentoo.org
Gentoo net-dns/bind-tools 9.16.22 net-dns zlogene@gentoo.org, chutzpah@gentoo.org
Gentoo net-dns/bind 9.16.22 net-dns zlogene@gentoo.org, chutzpah@gentoo.org
Gentoo net-dns/bind-tools 9.16.21 Potentially vulnerable net-dns zlogene@gentoo.org, chutzpah@gentoo.org
Gentoo net-dns/bind 9.16.21 Potentially vulnerable net-dns zlogene@gentoo.org, chutzpah@gentoo.org
Gentoo net-dns/bind-tools 9.16.18 Potentially vulnerable net-dns zlogene@gentoo.org, chutzpah@gentoo.org
Gentoo net-dns/bind 9.16.18 Potentially vulnerable net-dns zlogene@gentoo.org, chutzpah@gentoo.org
Gentoo net-dns/bind-tools 9.16.15 Potentially vulnerable net-dns zlogene@gentoo.org, chutzpah@gentoo.org
Gentoo net-dns/bind 9.16.15 Potentially vulnerable net-dns zlogene@gentoo.org, chutzpah@gentoo.org
GNU Guix bind 9.16.25 - -
GoboLinux Bind 9.11.1 Potentially vulnerable - -
HaikuPorts master net-dns/bind_utils 9.16.19 Potentially vulnerable net-dns -
Homebrew bind 9.16.25 - -
HP-UX 11.31
hppa_32
dig 2.0 Potentially vulnerable - -
HP-UX 11.31
ia64_32
dig 2.0 Potentially vulnerable - -
Hyperbola
extra
bind 9.11.5 Potentially vulnerable - -
Hyperbola
extra
bind-tools 9.11.5 Potentially vulnerable - -
Kali Linux Rolling
main
bind9 9.17.21 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
KaOS
core
dnsutils 9.16.24 - demm@kaosx.us
KaOS Build
build
dnsutils 9.16.25 - demm@kaosx.us
LiGurOS stable net-dns/bind 9.17.21 net-dns dev@liguros.net, zlogene@gentoo.org, chutzpah@gentoo.org
LiGurOS stable net-dns/bind-tools 9.17.20 net-dns dev@liguros.net, zlogene@gentoo.org, chutzpah@gentoo.org
LiGurOS stable net-dns/bind 9.17.20 net-dns dev@liguros.net, zlogene@gentoo.org, chutzpah@gentoo.org
LiGurOS stable net-dns/bind-tools 9.17.19 net-dns dev@liguros.net, zlogene@gentoo.org, chutzpah@gentoo.org
LiGurOS develop net-dns/bind 9.17.21 net-dns dev@liguros.net, zlogene@gentoo.org, chutzpah@gentoo.org
LiGurOS develop net-dns/bind-tools 9.17.20 net-dns dev@liguros.net, zlogene@gentoo.org, chutzpah@gentoo.org
LiGurOS develop net-dns/bind 9.17.20 net-dns dev@liguros.net, zlogene@gentoo.org, chutzpah@gentoo.org
LiGurOS develop net-dns/bind-tools 9.17.19 net-dns dev@liguros.net, zlogene@gentoo.org, chutzpah@gentoo.org
MacPorts bind9 9.16.25 net danielluke@github
Mageia 7
core/updates
bind 9.11.6 Potentially vulnerable System/Servers -
Mageia 7
core/updates
bind 9.11.6 Potentially vulnerable System/Servers -
Mageia 7
core/updates
bind 9.11.6 Potentially vulnerable System/Servers -
Mageia 7
core/updates
bind 9.11.6 Potentially vulnerable System/Servers -
Mageia 7
core/updates
bind 9.11.6 Potentially vulnerable System/Servers -
Mageia 7
core/release
bind 9.11.6 Potentially vulnerable System/Servers -
Mageia 8
core/updates
bind 9.11.36 System/Servers -
Mageia 8
core/updates
bind 9.11.31 Potentially vulnerable System/Servers -
Mageia 8
core/release
bind 9.11.27 Potentially vulnerable System/Servers -
Mageia 8
core/updates
bind 9.11.27 Potentially vulnerable System/Servers -
Mageia Cauldron
core/release
bind 9.16.25 System/Servers -
Manjaro Stable
extra
bind 9.16.23 - -
Manjaro Testing
extra
bind 9.16.24 - -
Manjaro Unstable
extra
bind 9.16.25 - -
MidnightBSD mports dns/bind916 9.16.20 Potentially vulnerable net -
MidnightBSD mports dns/bind-tools 9.16.20 Potentially vulnerable net -
MidnightBSD mports dns/samba-nsupdate 9.16.5 Potentially vulnerable net -
MidnightBSD mports dns/bind911 9.11.35 Potentially vulnerable net -
nixpkgs stable 21.05 bind 9.16.16 Potentially vulnerable - simons@cryp.to, mail@glob.in
nixpkgs stable 21.05 bind 9.16.16 Potentially vulnerable - simons@cryp.to, mail@glob.in
nixpkgs stable 21.05 bind 9.16.16 Potentially vulnerable - simons@cryp.to, mail@glob.in
nixpkgs stable 21.11 bind 9.16.16 Potentially vulnerable - mail@glob.in
nixpkgs stable 21.11 bind 9.16.16 Potentially vulnerable - mail@glob.in
nixpkgs stable 21.11 bind 9.16.16 Potentially vulnerable - mail@glob.in
nixpkgs unstable bind 9.16.16 Potentially vulnerable - mail@glob.in
nixpkgs unstable bind 9.16.16 Potentially vulnerable - mail@glob.in
nixpkgs unstable bind 9.16.16 Potentially vulnerable - mail@glob.in
openEuler 20.03
source
bind 9.11.4 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
bind 9.16.24 Applications/Internet -
OpenIndiana packages
hipster
bind 9.16.24 System/Services -
OpenIndiana packages
hipster
bind 9.16.23 Applications/Internet -
OpenIndiana packages
hipster
bind 9.16.23 System/Services -
OpenIndiana packages
hipster
bind 9.16.22 Applications/Internet -
OpenIndiana packages
hipster
bind 9.16.22 System/Services -
OpenIndiana packages
hipster
bind 9.16.21 Potentially vulnerable Applications/Internet -
OpenIndiana packages
hipster
bind 9.16.21 Potentially vulnerable System/Services -
OpenIndiana packages
hipster
bind 9.16.20 Potentially vulnerable Applications/Internet -
OpenIndiana packages
hipster
bind 9.16.20 Potentially vulnerable System/Services -
openmamba
devel
bind 9.17.9 Potentially vulnerable System/Servers silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
bind 9.15.0 Potentially vulnerable System/Servers bero@lindev.ch
OpenMandriva 4.0
main/release
bind 9.14.1 Potentially vulnerable System/Servers bero@lindev.ch
OpenMandriva Cooker
main/release
bind 9.17.20 System/Servers tpgxyz@gmail.com
OpenPKG bind 9.16.24 DNS -
openSUSE Leap 42.3
updates/oss
bind 9.9.9P1 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 42.3
main/oss
bind 9.9.9P1 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
main/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.0
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.1
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.1
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.1
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.1
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.1
updates/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.1
main/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
updates/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.2
main/oss
bind 9.11.2 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.3
main/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.3
main/oss
bind 9.16.6 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Leap 15.4
main/oss
bind 9.16.20 Potentially vulnerable Productivity/Networking/DNS/Servers -
openSUSE Tumbleweed
src-oss
bind 9.16.24 Productivity/Networking/DNS/Servers -
openSUSE network Tumbleweed bind 9.16.25 Productivity/Networking/DNS/Servers -
OpenWrt 17.01 x86_64
packages
bind-rndc 9.10.4-P5 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-check 9.10.4-P5 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-client 9.10.4-P5 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-dig 9.10.4-P5 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-dnssec 9.10.4-P5 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-host 9.10.4-P5 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-libs 9.10.4-P5 Potentially vulnerable libs frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-server 9.10.4-P5 Potentially vulnerable net frodo@morgul.net
OpenWrt 17.01 x86_64
packages
bind-tools 9.10.4-P5 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-check 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-client 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-dig 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-dnssec 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-host 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-libs 9.11.19 Potentially vulnerable libs frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-rndc 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-server 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 18.06 x86_64
packages
bind-tools 9.11.19 Potentially vulnerable net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-check 9.16.23 net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-client 9.16.23 net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-dig 9.16.23 net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-dnssec 9.16.23 net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-host 9.16.23 net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-libs 9.16.23 libs frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-nslookup 9.16.23 net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-rndc 9.16.23 net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-server-filter-aaaa 9.16.23 net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-server 9.16.23 net frodo@morgul.net
OpenWrt 19.07 x86_64
packages
bind-tools 9.16.23 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-check 9.17.20 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-client 9.17.20 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-dig 9.17.20 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-dnssec 9.17.20 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-host 9.17.20 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-libs 9.17.20 libs frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-nslookup 9.17.20 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-rndc 9.17.20 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-server-filter-aaaa 9.17.20 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-server 9.17.20 net frodo@morgul.net
OpenWrt 21.02 x86_64
packages
bind-tools 9.17.20 net frodo@morgul.net
Parabola
extra
bind 9.16.25 - -
Pardus 17
main
bind9 9.10.3.dfsg.P4 Potentially vulnerable net lamont@debian.org, mgilbert@debian.org, robie.basak@canonical.com
Pardus 17
updates/main
bind9 9.10.3.dfsg.P4 Potentially vulnerable net pkg-dns-devel@lists.alioth.debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Pardus 17
updates/main
bind9 9.10.3.dfsg.P4 Potentially vulnerable net lamont@debian.org, mgilbert@debian.org, robie.basak@canonical.com
Pardus 19
updates/main
bind9 9.11.5.P4 Potentially vulnerable net team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Pardus 19
main
bind9 9.11.5.P4 Potentially vulnerable net team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Pardus 21
main
bind9 9.16.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Pardus 21
updates/main
bind9 9.16.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Parrot LTS
lts/main
bind9 9.16.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Parrot LTS
lts-updates/main
bind9 9.16.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Parrot Rolling
rolling/main
bind9 9.16.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
PCLinuxOS bind 9.10.8.P1 Potentially vulnerable System/Servers -
Pisi Linux
main
bind 9.14.9 Potentially vulnerable service admins@pisilinux.org
pkgsrc current net/bind916 9.16.24 net pkgsrc-users@netbsd.org
pkgsrc current net/bind911 9.11.36 net pkgsrc-users@netbsd.org
PLD Linux bind 9.16.22 - -
PureOS Amber bind9 9.11.5.P4 Potentially vulnerable misc team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
PureOS Amber bind9 9.11.5.P4 Potentially vulnerable misc team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
PureOS landing bind9 9.16.22 misc team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Raspbian Oldstable
main
bind9 9.11.5.P4 Potentially vulnerable net team+dns@tracker.debian.org, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Raspbian Stable
main
bind9 9.16.22 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Raspbian Testing
main
bind9 9.17.21 net team+dns@tracker.debian.org, berni@debian.org, ondrej@debian.org
Ravenports bind 9.16.24 dns fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
bind 9.11.26 Potentially vulnerable Unspecified infrastructure@rockylinux.org
Rosa 2014.1
main/updates
bind 9.10.8.P1 Potentially vulnerable - -
Rosa 2014.1
main/release
bind 9.9.1 Potentially vulnerable - -
Rosa 2016.1
main/updates
bind 9.11.4.P1 Potentially vulnerable - -
Rosa 2016.1
main/release
bind 9.11.0.P2 Potentially vulnerable - -
Rosa 2019.1
main/release
bind 9.11.26 Potentially vulnerable System/Servers a.proklov@rosalinux.ru
Rosa Server 6.9
base/release
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
bind 9.8.2-rc1 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
bind 9.9.4 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
bind 9.9.4 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
bind 9.9.4 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.11.4 Potentially vulnerable Unspecified -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x bind 9.9.4 Potentially vulnerable System Environment/Daemons -
Scoop
main
bind 9.16.25 - -
Slackware 14.2
patches
bind 9.11.36 - volkerdi@slackware.com
Slackware 14.2
slackware
bind 9.10.4_P1 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
bind 9.16.25 - volkerdi@slackware.com
Slackware64 14.2
patches
bind 9.11.36 - volkerdi@slackware.com
Slackware64 14.2
slackware64
bind 9.10.4_P1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
bind 9.16.25 - volkerdi@slackware.com
Slackwarearm 14.2
patches
bind 9.11.36 - volkerdi@slackware.com
Slackwarearm 14.2
slackware
bind 9.10.4_P1 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
bind 9.16.25 - volkerdi@slackware.com
SliTaz Cooking bind 9.14.9 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Cooking bind-client 9.14.9 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Cooking bind-dev 9.14.9 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Cooking libbind 9.14.9 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next bind 9.12.3 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Next bind-client 9.12.3 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Next bind-lib 9.12.3 Potentially vulnerable libdevel pascal.bellard@slitaz.org
SliTaz Next bind-dev 9.12.3 Potentially vulnerable development pascal.bellard@slitaz.org
Solus bind-utils 9.17.8 Potentially vulnerable network.util joshua@streambits.io
Solus bind-utils-dbginfo 9.17.8 Potentially vulnerable debug joshua@streambits.io
Spack bind9 9_14_6 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE bind 9.7.2-P3 Potentially vulnerable extra/server base/system rene@t2-project.org
Termux dnsutils 9.16.11 Potentially vulnerable - termux@github
Trisquel 6.0
toutatis/main
bind9 9.8.1.dfsg.P1 Potentially vulnerable net lamont@debian.org, bdale@gag.com
Trisquel 6.0
toutatis-updates/main
bind9 9.8.1.dfsg.P1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, bdale@gag.com
Trisquel 7.0
belenos-updates/main
bind9 9.9.5.dfsg Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, bdale@gag.com
Trisquel 7.0
belenos/main
bind9 9.9.5.dfsg Potentially vulnerable net lamont@debian.org, bdale@gag.com
Trisquel 8.0
flidas/main
bind9 9.10.3.dfsg.P4 Potentially vulnerable net lamont@debian.org, mgilbert@debian.org, robie.basak@canonical.com
Trisquel 8.0
flidas-updates/main
bind9 9.10.3.dfsg.P4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, mgilbert@debian.org, robie.basak@canonical.com
Trisquel 9.0
etiona-updates/main
bind9 9.11.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Trisquel 9.0
etiona/main
bind9 9.11.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Trisquel 10.0
nabia-updates/main
bind9 9.16.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Trisquel 10.0
nabia/main
bind9 9.16.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 14.04
trusty/main
bind9 9.9.5.dfsg Potentially vulnerable net lamont@debian.org, bdale@gag.com
Ubuntu 14.04
trusty-updates/main
bind9 9.9.5.dfsg Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, bdale@gag.com
Ubuntu 16.04
xenial-updates/main
bind9 9.10.3.dfsg.P4 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, mgilbert@debian.org, robie.basak@canonical.com
Ubuntu 16.04
xenial/main
bind9 9.10.3.dfsg.P4 Potentially vulnerable net lamont@debian.org, mgilbert@debian.org, robie.basak@canonical.com
Ubuntu 18.04
bionic-updates/main
bind9 9.11.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Ubuntu 18.04
bionic/main
bind9 9.11.3 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, lamont@debian.org, mgilbert@debian.org, ondrej@debian.org, robie.basak@canonical.com
Ubuntu 20.04
focal/main
bind9 9.16.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 20.04
focal-updates/main
bind9 9.16.1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 21.04
hirsute-updates/main
bind9 9.16.8 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 21.04
hirsute/main
bind9 9.16.8 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 21.10
impish/main
bind9 9.16.15 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 21.10
impish-updates/main
bind9 9.16.15 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Ubuntu 22.04
jammy/main
bind9 9.16.15 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, berni@debian.org, ondrej@debian.org
Void Linux x86_64
x86_64
bind 9.16.22 - randy@mccaskill.us
Void Linux x86_64
x86_64
bind-devel 9.16.22 - randy@mccaskill.us
Void Linux x86_64
x86_64
bind-libs 9.16.22 - randy@mccaskill.us
Void Linux x86_64
x86_64
bind-utils 9.16.22 - randy@mccaskill.us
Wikidata BIND 9.16.25 - -