Versions Packages Information History CVEs Badges Report

Packages for c-ares

385 package(s) known

c-ares

1.18.1 Potentially vulnerable (1.18.1-r1)

c-ares-dbg

1.18.1 Potentially vulnerable (1.18.1-r1)

c-ares-dev

1.18.1 Potentially vulnerable (1.18.1-r1)

c-ares-doc

1.18.1 Potentially vulnerable (1.18.1-r1)

c-ares

1.15.0 Potentially vulnerable (1.15.0-1)

c-ares

1.14.0 Potentially vulnerable (1.14.0-1)

c-ares

1.13.0 Potentially vulnerable (1.13.0-1)

c-ares

1.12.0 Potentially vulnerable (1.12.0-1)

c-ares

1.10.0 Potentially vulnerable (1.10.0-1)

c-ares

1.10.0 Potentially vulnerable (1.10.0-2)

c-ares

1.9.1 Potentially vulnerable (1.9.1-1)

c-ares

1.9.1 Potentially vulnerable (1.9.1-2)

c-ares

1.8.0 Potentially vulnerable (1.8.0-2)

c-ares

1.8.0 Potentially vulnerable (1.8.0-1)

c-ares

1.7.5 Potentially vulnerable (1.7.5-1)

c-ares

1.7.5 Potentially vulnerable (1.7.5-2)

c-ares

1.7.4 Potentially vulnerable (1.7.4-1)

c-ares

1.7.4 Potentially vulnerable (1.7.4-2)

c-ares

1.7.1 Potentially vulnerable (1.7.1-1)

c-ares

1.7.1 Potentially vulnerable (1.7.1-2)

c-ares

1.13.0 Potentially vulnerable (1.13.0-9.el8_9.1)

c-ares

1.13.0 Potentially vulnerable (1.13.0-8.el8)

c-ares

1.19.1 (1.19.1-1.el9)

c-ares

1.14.0 Potentially vulnerable (1.14.0-r0)

c-ares-dev

1.14.0 Potentially vulnerable (1.14.0-r0)

c-ares-doc

1.14.0 Potentially vulnerable (1.14.0-r0)

c-ares

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares-dev

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares-doc

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares-dev

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares-doc

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-dev

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-doc

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-dev

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-doc

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-static

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-dev

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-doc

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-static

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-dev

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-doc

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares-static

1.17.2 Potentially vulnerable (1.17.2-r0)

c-ares

1.19.1 (1.19.1-r0)

c-ares-dev

1.19.1 (1.19.1-r0)

c-ares-doc

1.19.1 (1.19.1-r0)

c-ares-static

1.19.1 (1.19.1-r0)

c-ares

1.19.1 (1.19.1-r0)

c-ares-dev

1.19.1 (1.19.1-r0)

c-ares-doc

1.19.1 (1.19.1-r0)

c-ares-static

1.19.1 (1.19.1-r0)

c-ares

1.19.1 (1.19.1-r0)

c-ares-dev

1.19.1 (1.19.1-r0)

c-ares-doc

1.19.1 (1.19.1-r0)

c-ares

1.19.1 (1.19.1-r0)

c-ares-dev

1.19.1 (1.19.1-r0)

c-ares-doc

1.19.1 (1.19.1-r0)

c-ares-static

1.19.1 (1.19.1-r0)

c-ares

1.22.1 (1.22.1-r0)

c-ares-dev

1.22.1 (1.22.1-r0)

c-ares-doc

1.22.1 (1.22.1-r0)

c-ares-static

1.22.1 (1.22.1-r0)

c-ares-utils

1.22.1 (1.22.1-r0)

c-ares

1.17.2 Potentially vulnerable (1.17.2-alt1)

c-ares

1.19.1 (1.19.1-alt1)

c-ares

1.19.1 (1.19.1-alt1)

c-ares

1.17.2 Potentially vulnerable (1.17.2-1.9.amzn1)

c-ares

1.17.2 Potentially vulnerable (1.17.2-1.10.amzn1)

c-ares

1.17.2 Potentially vulnerable (1.17.2-1.8.amzn1)

c-ares

1.13.0 Potentially vulnerable (1.13.0-1.5.amzn1)

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.6.amzn1)

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.amzn2.0.3)

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.amzn2)

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.amzn2.0.2)
Apertis v2021
v2021/target

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1+apertis1)
Apertis v2022
v2022/target

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u3+apertis0)
Apertis v2023
v2023/target

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u3+apertis0)

c-ares

1.18.1 Potentially vulnerable (1.18.1-3+apertis0)
Arch
extra

c-ares

1.23.0 (1.23.0-1)

c-ares

1.19.1 (1.19.1-1.0)

c-ares

1.19.1 (1.19.1-1.0)

c-ares

1.19.1 (1.19.1-1.0)

c-ares

1.23.0 (1.23.0-1)

c-ares

1.19.1 (1.19.1-1)

c-ares

1.19.1 (1.19.1-1)

c-ares

1.19.1 (1.19.1-1)

lib32-c-ares

1.19.1 (1.19.1-2)

mingw-w64-c-ares

1.19.1 (1.19.1-1)
Artix
world

c-ares

1.23.0 (1.23.0-1)

c-ares

1.17.1 Potentially vulnerable

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.el6)

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.el7)
CentOS 7
updates

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.el7_9.1)
CentOS 8
BaseOS

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-10.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-6.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-7.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-8.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-9.el8)

c-ares

1.19.1 (1.19.1-1.el9)

c-ares

1.17.1 Potentially vulnerable (1.17.1-4.el9)

c-ares

1.17.1 Potentially vulnerable (1.17.1-5.el9)

c-ares

1.17.1 Potentially vulnerable (1.17.1-6.el9)

c-ares-debuginfo

1.14.0 Potentially vulnerable (1.14.0-1)

libcares-devel

1.14.0 Potentially vulnerable (1.14.0-1)

libcares2

1.14.0 Potentially vulnerable (1.14.0-1)

mingw64-i686-c-ares

1.14.0 Potentially vulnerable (1.14.0-1)

mingw64-x86_64-c-ares

1.14.0 Potentially vulnerable (1.14.0-1)
Deepin
main

c-ares

1.14.0.2 Potentially vulnerable (1.14.0.2-deepin1)
Deepin
main

c-ares

1.14.0.1 Potentially vulnerable (1.14.0.1-1)
Devuan 3.0
beowulf/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1)
Devuan 4.0
chimaera/main

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u3)
Devuan Unstable
unstable/main

c-ares

1.23.0 (1.23.0-1)
Entware
mipselsf-k3.4

libcares

1.19.1 (1.19.1-1)
Entware
mipssf-k3.4

libcares

1.19.1 (1.19.1-1)
Entware
x64-k3.2

libcares

1.19.1 (1.19.1-1)
Entware
aarch64-k3.10

libcares

1.19.1 (1.19.1-1)
Entware
armv5sf-k3.2

libcares

1.19.1 (1.19.1-1)
Entware
armv7sf-k2.6

libcares

1.19.1 (1.19.1-1)
Entware
armv7sf-k3.2

libcares

1.19.1 (1.19.1-1)

c-ares

1.13.0 Potentially vulnerable (1.13.0-6.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-9.el8_9.1)
EuroLinux 8
appstream

c-ares

1.13.0 Potentially vulnerable (1.13.0-6.el8_8.2)

c-ares

1.17.1 Potentially vulnerable (1.17.1-5.el9)
EuroLinux 9
appstream

c-ares

1.17.1 Potentially vulnerable (1.17.1-5.el9_2.1)
Exherbo
arbor

net-dns/c-ares

1.22.1
Fedora 26
release

c-ares

1.13.0 Potentially vulnerable (1.13.0-1.fc26)
Fedora 26
updates

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-1.fc26)
Fedora 26
release

mingw-c-ares

1.12.0 Potentially vulnerable (1.12.0-2.fc26)
Fedora 27
release

c-ares

1.13.0 Potentially vulnerable (1.13.0-3.fc27)
Fedora 27
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-2.fc27)
Fedora 28
release

c-ares

1.13.0 Potentially vulnerable (1.13.0-4.fc28)
Fedora 28
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-3.fc28)
Fedora 29
release

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.fc29)
Fedora 29
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-4.fc29)
Fedora 30
release

c-ares

1.15.0 Potentially vulnerable (1.15.0-3.fc30)
Fedora 30
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-5.fc30)
Fedora 31
release

c-ares

1.15.0 Potentially vulnerable (1.15.0-4.fc31)
Fedora 31
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-6.fc31)
Fedora 32
updates

c-ares

1.17.0 Potentially vulnerable (1.17.0-1.fc32)
Fedora 32
release

c-ares

1.15.0 Potentially vulnerable (1.15.0-5.fc32)
Fedora 32
updates

mingw-c-ares

1.17.1 Potentially vulnerable (1.17.1-1.fc32)
Fedora 32
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-7.fc32)
Fedora 33
updates

c-ares

1.17.2 Potentially vulnerable (1.17.2-1.fc33)
Fedora 33
release

c-ares

1.16.1 Potentially vulnerable (1.16.1-3.fc33)
Fedora 33
updates

mingw-c-ares

1.17.2 Potentially vulnerable (1.17.2-1.fc33)
Fedora 33
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-9.fc33)
Fedora 34
updates

c-ares

1.17.2 Potentially vulnerable (1.17.2-1.fc34)
Fedora 34
release

c-ares

1.17.1 Potentially vulnerable (1.17.1-2.fc34)
Fedora 34
updates

mingw-c-ares

1.17.2 Potentially vulnerable (1.17.2-1.fc34)
Fedora 34
release

mingw-c-ares

1.17.1 Potentially vulnerable (1.17.1-1.fc34)
Fedora 35
release

c-ares

1.17.2 Potentially vulnerable (1.17.2-1.fc35)
Fedora 35
release

mingw-c-ares

1.17.2 Potentially vulnerable (1.17.2-1.fc35)
Fedora 36
updates

c-ares

1.19.0 Potentially vulnerable (1.19.0-1.fc36)
Fedora 36
release

c-ares

1.17.2 Potentially vulnerable (1.17.2-2.fc36)
Fedora 36
release

mingw-c-ares

1.17.2 Potentially vulnerable (1.17.2-2.fc36)
Fedora 37
updates

c-ares

1.21.0 (1.21.0-1.fc37)
Fedora 37
release

c-ares

1.17.2 Potentially vulnerable (1.17.2-3.fc37)
Fedora 37
release

mingw-c-ares

1.17.2 Potentially vulnerable (1.17.2-4.fc37)
Fedora 38
updates

c-ares

1.21.0 (1.21.0-1.fc38)
Fedora 38
release

c-ares

1.19.0 Potentially vulnerable (1.19.0-1.fc38)
Fedora 38
release

mingw-c-ares

1.17.2 Potentially vulnerable (1.17.2-5.fc38)
Fedora 39
updates

c-ares

1.21.0 (1.21.0-1.fc39)
Fedora 39
development

c-ares

1.19.1 (1.19.1-1.fc39)
Fedora 39
development

mingw-c-ares

1.17.2 Potentially vulnerable (1.17.2-6.fc39)
Fedora Rawhide
development

c-ares

1.22.1 (1.22.1-1.fc40)
Fedora Rawhide
development

mingw-c-ares

1.17.2 Potentially vulnerable (1.17.2-6.fc39)

dns/c-ares

1.22.0

net-dns/c-ares

1.23.0

net-dns/c-ares

1.22.1

net-dns/c-ares

1.21.0

net-dns/c-ares

1.19.1

c-ares

1.18.1 Potentially vulnerable

c-ares

1.18.1 Potentially vulnerable

c-ares

1.18.1 Potentially vulnerable

C-Ares

1.16.1 Potentially vulnerable
HP-UX 11.31
ia64_64

c_ares

1.21.0
HP-UX 11.31
ia64_64

c_ares

1.16.1 Potentially vulnerable
HP-UX 11.31
hppa_32

c_ares

1.16.1 Potentially vulnerable
HP-UX 11.31
ia64_32

c_ares

1.4.0 Potentially vulnerable
HP-UX 11.31
hppa_32

c_ares

1.4.0 Potentially vulnerable

c-ares

1.17.2 Potentially vulnerable (1.17.2-1)

c-ares

1.20.1 (1.20.1-1)
KaOS
main

c-ares

1.22.1 (1.22.1-1)

c-ares

1.23.0 (1.23.0-1)

net-dns/c-ares

1.19.1

net-dns/c-ares

1.19.0 Potentially vulnerable

net-dns/c-ares

1.23.0

net-dns/c-ares

1.22.1

net-dns/c-ares

1.21.0

net-dns/c-ares

1.19.1
Mageia 8
core/updates

c-ares

1.17.1 Potentially vulnerable (1.17.1-1.2.mga8)
Mageia 8
core/release

c-ares

1.17.1 Potentially vulnerable (1.17.1-1.mga8)
Mageia 8
core/updates

c-ares

1.17.1 Potentially vulnerable (1.17.1-1.1.mga8)
Mageia cauldron
core/release

c-ares

1.21.0 (1.21.0-1.mga10)

c-ares

1.22.1 (1.22.1-1)

c-ares

1.22.1 (1.22.1-1)

c-ares

1.23.0 (1.23.0-1)

dns/c-ares

1.19.1

mingw-w64-i686-c-ares

1.23.0 (1.23.0-1)

mingw-w64-x86_64-c-ares

1.23.0 (1.23.0-1)

libcares

1.22.1 (1.22.1-1)

libcares-devel

1.22.1 (1.22.1-1)

c-ares

1.17.2 Potentially vulnerable

c-ares

1.18.1 Potentially vulnerable

c-ares

1.18.1 Potentially vulnerable

c-ares

1.18.1 Potentially vulnerable

c-ares

1.19.1

c-ares

1.19.1

c-ares

1.19.1

c-ares

1.19.1

net/libcares

1.19.1

c-ares

1.15.0 Potentially vulnerable (1.15.0-1.oe1)

c-ares

1.18.1 Potentially vulnerable (1.18.1-1.oe2203)

c-ares

1.23.0

c-ares

1.22.1

c-ares

1.22.0

c-ares

1.21.0

c-ares

1.20.1
openmamba
devel

libcares

1.23.0 (1.23.0-1mamba)
OpenMandriva 4.0
main/release

c-ares

1.15.0 Potentially vulnerable (1.15.0-2)
OpenMandriva 4.1
main/release

c-ares

1.15.0 Potentially vulnerable (1.15.0-2)
OpenMandriva 4.2
main/release

c-ares

1.17.1 Potentially vulnerable (1.17.1-1)
OpenMandriva 4.3
main/release

c-ares

1.18.1 Potentially vulnerable (1.18.1-1)

c-ares

1.22.1 (1.22.1-1)
OpenMandriva Cooker
main/release

c-ares

1.22.1 (1.22.1-1)

ares

1.23.0

ares

1.22.1

libcares2

1.9.1 Potentially vulnerable (1.9.1-10.1)
openSUSE Leap 15.0
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.14.1)
openSUSE Leap 15.0
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.17.1)

c-ares

1.14.0 Potentially vulnerable (1.14.0-lp150.1.1)
openSUSE Leap 15.1
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.14.1)
openSUSE Leap 15.1
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.17.1)
openSUSE Leap 15.1
updates/oss

c-ares

1.17.0 Potentially vulnerable (1.17.0-lp151.3.6.1)
openSUSE Leap 15.1
updates/oss

c-ares

1.17.0 Potentially vulnerable (1.17.0-lp151.3.9.1)
openSUSE Leap 15.1
updates/oss

c-ares

1.15.0 Potentially vulnerable (1.15.0+20200117-lp151.3.3.1)

c-ares

1.14.0 Potentially vulnerable (1.14.0-lp151.2.3)
openSUSE Leap 15.1
updates/oss

c-ares-tests

1.17.0 Potentially vulnerable (1.17.0-lp151.3.6.1)
openSUSE Leap 15.1
updates/oss

c-ares-tests

1.17.0 Potentially vulnerable (1.17.0-lp151.3.9.1)
openSUSE Leap 15.2
updates/oss

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-lp152.2.12.1)
openSUSE Leap 15.2
updates/oss

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-lp152.2.9.1)
openSUSE Leap 15.2
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.14.1)
openSUSE Leap 15.2
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.17.1)
openSUSE Leap 15.2
updates/oss

c-ares

1.17.0 Potentially vulnerable (1.17.0-lp152.2.3.1)
openSUSE Leap 15.2
updates/oss

c-ares

1.17.0 Potentially vulnerable (1.17.0-lp152.2.6.1)

c-ares

1.15.0 Potentially vulnerable (1.15.0+20200117-lp152.1.5)
openSUSE Leap 15.2
updates/oss

c-ares-tests

1.17.1 Potentially vulnerable (1.17.1+20200724-lp152.2.12.1)
openSUSE Leap 15.2
updates/oss

c-ares-tests

1.17.1 Potentially vulnerable (1.17.1+20200724-lp152.2.9.1)
openSUSE Leap 15.2
updates/oss

c-ares-tests

1.17.0 Potentially vulnerable (1.17.0-lp152.2.3.1)
openSUSE Leap 15.2
updates/oss

c-ares-tests

1.17.0 Potentially vulnerable (1.17.0-lp152.2.6.1)
openSUSE Leap 15.3
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.14.1)
openSUSE Leap 15.3
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.17.1)

c-ares

1.17.0 Potentially vulnerable (1.17.0-3.11.1)

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.17.1)
openSUSE Leap 15.4
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.14.1)
openSUSE Leap 15.4
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.17.1)

c-ares

1.19.0 Potentially vulnerable (1.19.0-150000.3.20.1)
openSUSE Leap 15.5
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.14.1)
openSUSE Leap 15.5
updates/sle

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.17.1)

c-ares

1.20.1 (1.20.1-1.2)

libcares

1.11.0 Potentially vulnerable (1.11.0-1)
Parabola
extra

c-ares

1.23.0 (1.23.0-1)
Pardus 21
updates/main

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u3)

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u3)
Parrot
parrot/main

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u3)
Parrot
parrot-updates/main

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u3)

c-ares

1.18.1 Potentially vulnerable (1.18.1-1pclos2021)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System/Libraries

c-ares

1.18.1 Potentially vulnerable

net/libcares

1.22.1

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1)

c-ares

1.18.1 Potentially vulnerable (1.18.1-3)

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u3)

c-ares

1.18.1 Potentially vulnerable (1.18.1-3)

c-ares

1.20.1 (1.20.1-1)

c-ares

1.13.0 Potentially vulnerable (1.13.0-9.el8_9.1)
Rocky Linux 9
AppStream

c-ares

1.19.1 (1.19.1-1.el9)

c-ares

1.19.1 (1.19.1-1.el9)
Rosa 2021.1
main/release

c-ares

1.19.1 (1.19.1-1)
Rosa Server 6.9
base/release

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.res6)
Rosa Server 7.3
base/release

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.res7)
Rosa Server 7.5
base/release

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.res7)

c-ares

1.10.0 Potentially vulnerable (1.10.0-1.el7)

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.el7)

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.el7_9.1)

c-ares

1.19.1
Slackware 15.0
slackware

c-ares

1.18.1 Potentially vulnerable

c-ares

1.23.0

c-ares

1.19.1
Slackware64 15.0
slackware64

c-ares

1.18.1 Potentially vulnerable

c-ares

1.23.0

c-ares

1.19.1

c-ares

1.18.1 Potentially vulnerable

c-ares

1.18.1 Potentially vulnerable

c-ares-dev

1.18.1 Potentially vulnerable

c-ares-dev

1.15.0 Potentially vulnerable

c-ares-dev

1.15.0 Potentially vulnerable

c-ares

1.19.1

c-ares-dbginfo

1.19.1

c-ares-devel

1.19.1

c-ares

1.19.1
Trisquel 10.0
nabia-security/main

c-ares

1.15.0 Potentially vulnerable (1.15.0-1ubuntu0.4)
Trisquel 10.0
nabia-security/main

c-ares

1.15.0 Potentially vulnerable (1.15.0-1ubuntu0.1)
Trisquel 10.0
nabia-updates/main

c-ares

1.15.0 Potentially vulnerable (1.15.0-1ubuntu0.4)
Trisquel 10.0
nabia-updates/main

c-ares

1.15.0 Potentially vulnerable (1.15.0-1ubuntu0.1)
Trisquel 10.0
nabia/main

c-ares

1.15.0 Potentially vulnerable (1.15.0-1build1)
Trisquel 11.0
aramo-updates/main

c-ares

1.18.1 Potentially vulnerable (1.18.1-1ubuntu0.22.04.2)
Trisquel 11.0
aramo-security/main

c-ares

1.18.1 Potentially vulnerable (1.18.1-1ubuntu0.22.04.2)
Trisquel 11.0
aramo/main

c-ares

1.18.1 Potentially vulnerable (1.18.1-1build1)
Ubuntu 18.04
bionic-updates/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1ubuntu0.2)

c-ares

1.23.0 (1.23.0_1)

c-ares-devel

1.23.0 (1.23.0_1)

c-ares-utils

1.19.0 Potentially vulnerable (1.19.0_1)

c-ares

1.22.0

c-ares

1.18.1 Potentially vulnerable