Versions Packages Information History CVEs Badges Report

Packages for c-ares

308 package(s) known

c-ares

1.16.1 Potentially vulnerable (1.16.1-r0)

c-ares-dbg

1.16.1 Potentially vulnerable (1.16.1-r0)

c-ares-dev

1.16.1 Potentially vulnerable (1.16.1-r0)

c-ares-doc

1.16.1 Potentially vulnerable (1.16.1-r0)

c-ares

1.15.0 Potentially vulnerable (1.15.0-1)

c-ares

1.14.0 Potentially vulnerable (1.14.0-1)

c-ares

1.13.0 Potentially vulnerable (1.13.0-1)

c-ares

1.12.0 Potentially vulnerable (1.12.0-1)

c-ares

1.10.0 Potentially vulnerable (1.10.0-1)

c-ares

1.10.0 Potentially vulnerable (1.10.0-2)

c-ares

1.9.1 Potentially vulnerable (1.9.1-2)

c-ares

1.9.1 Potentially vulnerable (1.9.1-1)

c-ares

1.8.0 Potentially vulnerable (1.8.0-1)

c-ares

1.8.0 Potentially vulnerable (1.8.0-2)

c-ares

1.7.5 Potentially vulnerable (1.7.5-1)

c-ares

1.7.5 Potentially vulnerable (1.7.5-2)

c-ares

1.7.4 Potentially vulnerable (1.7.4-1)

c-ares

1.7.4 Potentially vulnerable (1.7.4-2)

c-ares

1.7.1 Potentially vulnerable (1.7.1-1)

c-ares

1.7.1 Potentially vulnerable (1.7.1-2)

c-ares

1.13.0 Potentially vulnerable (1.13.0-6.el8)

c-ares

1.17.1 Potentially vulnerable (1.17.1-5.el9)

c-ares

1.14.0 Potentially vulnerable (1.14.0-r0)

c-ares-dev

1.14.0 Potentially vulnerable (1.14.0-r0)

c-ares-doc

1.14.0 Potentially vulnerable (1.14.0-r0)

c-ares

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares-dev

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares-doc

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares-dev

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares-doc

1.15.0 Potentially vulnerable (1.15.0-r0)

c-ares

1.17.2 (1.17.2-r0)

c-ares-dev

1.17.2 (1.17.2-r0)

c-ares-doc

1.17.2 (1.17.2-r0)

c-ares

1.17.2 (1.17.2-r0)

c-ares-dev

1.17.2 (1.17.2-r0)

c-ares-doc

1.17.2 (1.17.2-r0)

c-ares-static

1.17.2 (1.17.2-r0)

c-ares

1.17.2 (1.17.2-r0)

c-ares-dev

1.17.2 (1.17.2-r0)

c-ares-doc

1.17.2 (1.17.2-r0)

c-ares-static

1.17.2 (1.17.2-r0)

c-ares

1.17.2 (1.17.2-r0)

c-ares-dev

1.17.2 (1.17.2-r0)

c-ares-doc

1.17.2 (1.17.2-r0)

c-ares-static

1.17.2 (1.17.2-r0)

c-ares

1.18.1 (1.18.1-r0)

c-ares-dev

1.18.1 (1.18.1-r0)

c-ares-doc

1.18.1 (1.18.1-r0)

c-ares-static

1.18.1 (1.18.1-r0)

c-ares

1.18.1 (1.18.1-r0)

c-ares-dev

1.18.1 (1.18.1-r0)

c-ares-doc

1.18.1 (1.18.1-r0)

c-ares-static

1.18.1 (1.18.1-r0)

c-ares

1.18.1 (1.18.1-r0)

c-ares-dev

1.18.1 (1.18.1-r0)

c-ares-doc

1.18.1 (1.18.1-r0)

c-ares-static

1.18.1 (1.18.1-r0)

c-ares

1.17.2 (1.17.2-alt1)

c-ares

1.18.1 (1.18.1-alt1)

c-ares

1.18.1 (1.18.1-alt1)

c-ares

1.17.2 (1.17.2-1.8.amzn1)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • Unspecified
  • License:
    • MIT
  • Links(s):

c-ares

1.13.0 Potentially vulnerable (1.13.0-1.5.amzn1)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System Environment/Libraries
  • License:
    • MIT
  • Links(s):

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.6.amzn1)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System Environment/Libraries
  • License:
    • MIT
  • Links(s):

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.amzn2)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System Environment/Libraries
  • License:
    • MIT
  • Links(s):

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.amzn2.0.2)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System Environment/Libraries
  • License:
    • MIT
  • Links(s):

c-ares

1.14.0 Potentially vulnerable (1.14.0-2)
Apertis v2020
v2020/target

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1+apertis1)
Apertis v2021
v2021/target

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1+apertis1)
Apertis v2022
v2022/target

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u1+apertis1)
Apertis v2023 Development
v2023dev1/target

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u1+apertis1)
Arch
extra

c-ares

1.18.1 (1.18.1-1)

c-ares

1.18.1 (1.18.1-1.0)

c-ares

1.18.1 (1.18.1-1.0)

c-ares

1.18.1 (1.18.1-1.0)

c-ares

1.18.1 (1.18.1-1)

c-ares

1.18.1 (1.18.1-1)

c-ares

1.18.1 (1.18.1-1)

c-ares

1.18.1 (1.18.1-1)

c-ares

1.18.1 (1.18.1-1)

mingw-w64-c-ares

1.15.0 Potentially vulnerable (1.15.0-1)
Artix
world

c-ares

1.18.1 (1.18.1-1)

c-ares

1.12.0 Potentially vulnerable (1.12.0-1+deb9u2)

c-ares

1.17.1 Potentially vulnerable

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.el6)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System Environment/Libraries
  • License:
    • MIT
  • Links(s):

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.el7)
CentOS 8
BaseOS

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.el8)

c-ares

1.13.0 Potentially vulnerable (1.13.0-6.el8)

c-ares

1.17.1 Potentially vulnerable (1.17.1-4.el9)

c-ares

1.17.1 Potentially vulnerable (1.17.1-5.el9)

c-ares

1.15.0 Potentially vulnerable

c-ares

1.17.1 Potentially vulnerable

c-ares

1.18.1

c-ares-debuginfo

1.14.0 Potentially vulnerable (1.14.0-1)

libcares-devel

1.14.0 Potentially vulnerable (1.14.0-1)

libcares2

1.14.0 Potentially vulnerable (1.14.0-1)

mingw64-i686-c-ares

1.14.0 Potentially vulnerable (1.14.0-1)

mingw64-x86_64-c-ares

1.14.0 Potentially vulnerable (1.14.0-1)
Debian 8
jessie/main

c-ares

1.10.0 Potentially vulnerable (1.10.0-2+deb8u2)
Deepin
main

c-ares

1.14.0.1 Potentially vulnerable (1.14.0.1-1)
Devuan 1.0
jessie/main

c-ares

1.10.0 Potentially vulnerable (1.10.0-2+deb8u2)
Devuan 2.0
ascii/main

c-ares

1.12.0 Potentially vulnerable (1.12.0-1+deb9u1)
Devuan 3.0
beowulf/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1)
Devuan 4.0
chimaera/main

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u1)
Devuan Unstable
unstable/main

c-ares

1.18.1 (1.18.1-1)

dns/c-ares

1.17.2
Entware
mipselsf-k3.4

libcares

1.18.1 (1.18.1-1)
Entware
mipssf-k3.4

libcares

1.18.1 (1.18.1-1)
Entware
x64-k3.2

libcares

1.18.1 (1.18.1-1)
Entware
aarch64-k3.10

libcares

1.18.1 (1.18.1-1)
Entware
armv5sf-k3.2

libcares

1.18.1 (1.18.1-1)
Entware
armv7sf-k2.6

libcares

1.18.1 (1.18.1-1)
Entware
armv7sf-k3.2

libcares

1.18.1 (1.18.1-1)

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.el8)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System Environment/Libraries
  • License:
    • MIT
  • Links(s):
Exherbo
arbor

net-dns/c-ares

1.18.1
Fedora 26
release

c-ares

1.13.0 Potentially vulnerable (1.13.0-1.fc26)
Fedora 26
updates

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-1.fc26)
Fedora 26
release

mingw-c-ares

1.12.0 Potentially vulnerable (1.12.0-2.fc26)
Fedora 27
release

c-ares

1.13.0 Potentially vulnerable (1.13.0-3.fc27)
Fedora 27
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-2.fc27)
Fedora 28
release

c-ares

1.13.0 Potentially vulnerable (1.13.0-4.fc28)
Fedora 28
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-3.fc28)
Fedora 29
release

c-ares

1.13.0 Potentially vulnerable (1.13.0-5.fc29)
Fedora 29
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-4.fc29)
Fedora 30
release

c-ares

1.15.0 Potentially vulnerable (1.15.0-3.fc30)
Fedora 30
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-5.fc30)
Fedora 31
release

c-ares

1.15.0 Potentially vulnerable (1.15.0-4.fc31)
Fedora 31
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-6.fc31)
Fedora 32
updates

c-ares

1.17.0 Potentially vulnerable (1.17.0-1.fc32)
Fedora 32
release

c-ares

1.15.0 Potentially vulnerable (1.15.0-5.fc32)
Fedora 32
updates

mingw-c-ares

1.17.1 Potentially vulnerable (1.17.1-1.fc32)
Fedora 32
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-7.fc32)
Fedora 33
updates

c-ares

1.17.2 (1.17.2-1.fc33)
Fedora 33
release

c-ares

1.16.1 Potentially vulnerable (1.16.1-3.fc33)
Fedora 33
updates

mingw-c-ares

1.17.2 (1.17.2-1.fc33)
Fedora 33
release

mingw-c-ares

1.13.0 Potentially vulnerable (1.13.0-9.fc33)
Fedora 34
updates

c-ares

1.17.2 (1.17.2-1.fc34)
Fedora 34
release

c-ares

1.17.1 Potentially vulnerable (1.17.1-2.fc34)
Fedora 34
updates

mingw-c-ares

1.17.2 (1.17.2-1.fc34)
Fedora 34
release

mingw-c-ares

1.17.1 Potentially vulnerable (1.17.1-1.fc34)
Fedora 35
release

c-ares

1.17.2 (1.17.2-1.fc35)
Fedora 35
release

mingw-c-ares

1.17.2 (1.17.2-1.fc35)
Fedora 36
release

c-ares

1.17.2 (1.17.2-2.fc36)
Fedora 36
release

mingw-c-ares

1.17.2 (1.17.2-2.fc36)
Fedora Rawhide
development

c-ares

1.17.2 (1.17.2-3.fc37)
Fedora Rawhide
development

mingw-c-ares

1.17.2 (1.17.2-4.fc37)

dns/c-ares

1.18.1 (1.18.1_1)
Funtoo 1.4
net-kit

net-dns/c-ares

1.17.2
Funtoo 1.4
net-kit

net-dns/c-ares

1.16.1 Potentially vulnerable

net-dns/c-ares

1.18.1

net-dns/c-ares

1.17.2

c-ares

1.17.2

C-Ares

1.16.1 Potentially vulnerable

c-ares

1.18.1
HP-UX 11.31
ia64_64

c_ares

1.18.1
HP-UX 11.31
hppa_32

c_ares

1.16.1 Potentially vulnerable
HP-UX 11.31
ia64_64

c_ares

1.16.1 Potentially vulnerable
HP-UX 11.31
hppa_32

c_ares

1.4.0 Potentially vulnerable
HP-UX 11.31
ia64_32

c_ares

1.4.0 Potentially vulnerable

c-ares

1.17.2 (1.17.2-1)
  • Summary:
    Library for asynchronous name resolves
  • Category:
    • Unspecified
  • License:
    • MIT
  • Links(s):

c-ares

1.18.1 (1.18.1-1)
KaOS
main

c-ares

1.18.1 (1.18.1-1)

net-dns/c-ares

1.18.1

net-dns/c-ares

1.17.2

net-dns/c-ares

1.18.1

net-dns/c-ares

1.17.2

c-ares

1.18.1
Mageia 7
core/updates

c-ares

1.17.1 Potentially vulnerable (1.17.1-1.mga7)
Mageia 7
core/release

c-ares

1.15.0 Potentially vulnerable (1.15.0-1.mga7)
Mageia 8
core/release

c-ares

1.17.1 Potentially vulnerable (1.17.1-1.mga8)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System/Libraries
  • License:
    • MIT
  • Links(s):
Mageia 8
core/updates

c-ares

1.17.1 Potentially vulnerable (1.17.1-1.1.mga8)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System/Libraries
  • License:
    • MIT
  • Links(s):
Mageia Cauldron
core/release

c-ares

1.18.1 (1.18.1-2.mga9)

c-ares

1.18.1 (1.18.1-1)

c-ares

1.18.1 (1.18.1-1)

c-ares

1.18.1 (1.18.1-1)

dns/c-ares

1.18.1

mingw-w64-i686-c-ares

1.18.1 (1.18.1-1)

mingw-w64-x86_64-c-ares

1.18.1 (1.18.1-1)

libcares

1.18.1 (1.18.1-1)

libcares

1.17.1 Potentially vulnerable (1.17.1-1)

libcares-devel

1.18.1 (1.18.1-1)

libcares-devel

1.17.1 Potentially vulnerable (1.17.1-1)

c-ares

1.17.2

c-ares

1.17.2

c-ares

1.18.1

c-ares

1.18.1

net/libcares

1.18.1

c-ares

1.15.0 Potentially vulnerable (1.15.0-1.oe1)

c-ares

1.18.1
openmamba
devel

libcares

1.18.1 (1.18.1-1mamba)
OpenMandriva 4.0
main/release

c-ares

1.15.0 Potentially vulnerable (1.15.0-2)
OpenMandriva 4.1
main/release

c-ares

1.15.0 Potentially vulnerable (1.15.0-2)
OpenMandriva 4.2
main/release

c-ares

1.17.1 Potentially vulnerable (1.17.1-1)

c-ares

1.18.1 (1.18.1-1)
OpenMandriva Cooker
main/release

c-ares

1.18.1 (1.18.1-1)

ares

1.18.1

libcares2

1.9.1 Potentially vulnerable (1.9.1-10.1)

c-ares

1.14.0 Potentially vulnerable (1.14.0-lp150.1.1)
openSUSE Leap 15.1
updates/oss

c-ares

1.17.0 Potentially vulnerable (1.17.0-lp151.3.6.1)
openSUSE Leap 15.1
updates/oss

c-ares

1.17.0 Potentially vulnerable (1.17.0-lp151.3.9.1)
openSUSE Leap 15.1
updates/oss

c-ares

1.15.0 Potentially vulnerable (1.15.0+20200117-lp151.3.3.1)

c-ares

1.14.0 Potentially vulnerable (1.14.0-lp151.2.3)
openSUSE Leap 15.1
updates/oss

c-ares-tests

1.17.0 Potentially vulnerable (1.17.0-lp151.3.6.1)
openSUSE Leap 15.1
updates/oss

c-ares-tests

1.17.0 Potentially vulnerable (1.17.0-lp151.3.9.1)
openSUSE Leap 15.2
updates/oss

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-lp152.2.12.1)
openSUSE Leap 15.2
updates/oss

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-lp152.2.9.1)
openSUSE Leap 15.2
updates/oss

c-ares

1.17.0 Potentially vulnerable (1.17.0-lp152.2.3.1)
openSUSE Leap 15.2
updates/oss

c-ares

1.17.0 Potentially vulnerable (1.17.0-lp152.2.6.1)

c-ares

1.15.0 Potentially vulnerable (1.15.0+20200117-lp152.1.5)
openSUSE Leap 15.2
updates/oss

c-ares-tests

1.17.1 Potentially vulnerable (1.17.1+20200724-lp152.2.12.1)
openSUSE Leap 15.2
updates/oss

c-ares-tests

1.17.1 Potentially vulnerable (1.17.1+20200724-lp152.2.9.1)
openSUSE Leap 15.2
updates/oss

c-ares-tests

1.17.0 Potentially vulnerable (1.17.0-lp152.2.3.1)
openSUSE Leap 15.2
updates/oss

c-ares-tests

1.17.0 Potentially vulnerable (1.17.0-lp152.2.6.1)

c-ares

1.17.0 Potentially vulnerable (1.17.0-3.11.1)

c-ares

1.17.1 Potentially vulnerable (1.17.1+20200724-3.17.1)

c-ares

1.18.1 (1.18.1-1.5)

libcares2

1.13.0 Potentially vulnerable (1.13.0-66.11)

libcares

1.11.0 Potentially vulnerable (1.11.0-1)

libcares

1.14.0 Potentially vulnerable (1.14.0-1)

libcares

1.15.0 Potentially vulnerable (1.15.0-5)

libcares

1.17.2 (1.17.2-1)
Parabola
extra

c-ares

1.18.1 (1.18.1-1)

c-ares

1.12.0 Potentially vulnerable (1.12.0-1+deb9u1)
Pardus 19
updates/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1)

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1)

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u1)
Pardus 21
updates/main

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u1)
Parrot
parrot/main

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u1)
Parrot
parrot-updates/main

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u1)

c-ares

1.18.1 (1.18.1-1pclos2021)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System/Libraries

c-ares

1.17.2

net/libcares

1.18.1

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1)

c-ares

1.18.1 (1.18.1-1pureos2)

c-ares

1.14.0 Potentially vulnerable (1.14.0-1+deb10u1)

c-ares

1.17.1 Potentially vulnerable (1.17.1-1+deb11u1)

c-ares

1.18.1 (1.18.1-1)

c-ares

1.13.0 Potentially vulnerable (1.13.0-6.el8)
Rosa 2014.1
main/updates

c-ares

1.11.0 Potentially vulnerable (1.11.0-1)
Rosa 2014.1
main/release

c-ares

1.10.0 Potentially vulnerable (1.10.0-2)
Rosa 2016.1
main/updates

c-ares

1.14.0 Potentially vulnerable (1.14.0-1)
Rosa 2016.1
main/release

c-ares

1.11.0 Potentially vulnerable (1.11.0-3)
Rosa 2021.1
main/release

c-ares

1.18.1 (1.18.1-1)
Rosa Server 6.9
base/release

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.res6)
Rosa Server 7.3
base/release

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.res7)
Rosa Server 7.5
base/release

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.res7)

c-ares

1.10.0 Potentially vulnerable (1.10.0-1.el7)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System Environment/Libraries
  • License:
    • MIT
  • Links(s):

c-ares

1.10.0 Potentially vulnerable (1.10.0-3.el7)
  • Summary:
    A library that performs asynchronous DNS operations
  • Category:
    • System Environment/Libraries
  • License:
    • MIT
  • Links(s):
Slackware 15.0
slackware

c-ares

1.18.1

c-ares

1.18.1
Slackware64 15.0
slackware64

c-ares

1.18.1

c-ares

1.18.1

c-ares

1.18.1

c-ares

1.18.1

c-ares-dev

1.18.1

c-ares

1.15.0 Potentially vulnerable

c-ares-dev

1.15.0 Potentially vulnerable

c-ares

1.18.1

c-ares-dbginfo

1.18.1

c-ares-devel

1.18.1

c-ares

1.17.1 Potentially vulnerable

c-ares

1.18.1
Trisquel 6.0
toutatis/main

c-ares

1.7.5 Potentially vulnerable (1.7.5-1)
Trisquel 6.0
toutatis-updates/main

c-ares

1.7.5 Potentially vulnerable (1.7.5-1ubuntu0.1)
Trisquel 7.0
belenos-updates/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1~ubuntu14.04.1~ppa1)
Trisquel 7.0
belenos/main

c-ares

1.10.0 Potentially vulnerable (1.10.0-2)
Trisquel 7.0 backports
belenos-backports/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1~ubuntu14.04.1~ppa1)
Trisquel 8.0
flidas/main

c-ares

1.10.0 Potentially vulnerable (1.10.0-3)
Trisquel 8.0
flidas-updates/main

c-ares

1.10.0 Potentially vulnerable (1.10.0-3ubuntu0.2)
Trisquel 8.0 backports
flidas-backports/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1~ubuntu16.04.1~ppa1)
Trisquel 9.0
etiona/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1)
Trisquel 9.0
etiona-updates/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1ubuntu0.1)
Trisquel 10.0
nabia/main

c-ares

1.15.0 Potentially vulnerable (1.15.0-1build1)
Trisquel 10.0
nabia-updates/main

c-ares

1.15.0 Potentially vulnerable (1.15.0-1ubuntu0.1)
Ubuntu 14.04
trusty-updates/main

c-ares

1.10.0 Potentially vulnerable (1.10.0-2ubuntu0.2)
Ubuntu 16.04
xenial-updates/main

c-ares

1.10.0 Potentially vulnerable (1.10.0-3ubuntu0.2)
Ubuntu 18.04
bionic-updates/main

c-ares

1.14.0 Potentially vulnerable (1.14.0-1ubuntu0.1)
Ubuntu 20.04
focal-updates/main

c-ares

1.15.0 Potentially vulnerable (1.15.0-1ubuntu0.1)
Ubuntu 20.04
focal/main

c-ares

1.15.0 Potentially vulnerable (1.15.0-1build1)
Ubuntu 22.04
jammy/main

c-ares

1.18.1 (1.18.1-1build1)
Ubuntu 22.10
kinetic/main

c-ares

1.18.1 (1.18.1-1build1)

c-ares

1.18.1

c-ares

1.18.1 (1.18.1_1)

c-ares-devel

1.18.1 (1.18.1_1)

c-ares

1.18.1