Versions Packages Information History CVEs Badges Report

Versions for c-ares

350 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
c-ares-doc 1.18.1 - awilfox@adelielinux.org
Adélie Linux current
user
c-ares-dbg 1.18.1 - awilfox@adelielinux.org
Adélie Linux current
user
c-ares 1.18.1 - awilfox@adelielinux.org
Adélie Linux current
user
c-ares-dev 1.18.1 - awilfox@adelielinux.org
AIX Open Source Packages c-ares 1.15.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.14.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.13.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.12.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.10.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.10.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.9.1 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.9.1 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.8.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.8.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.5 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.5 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.4 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.4 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.1 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.1 Potentially vulnerable - -
AlmaLinux 8
BaseOS
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries packager@almalinux.org
AlmaLinux 9
BaseOS
c-ares 1.17.1 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
c-ares 1.14.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.8
main
c-ares-dev 1.14.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.8
main
c-ares-doc 1.14.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.9
main
c-ares-doc 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.9
main
c-ares 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.9
main
c-ares-dev 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.10
main
c-ares 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.10
main
c-ares-doc 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.10
main
c-ares-dev 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.11
main
c-ares-dev 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.11
main
c-ares-doc 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.11
main
c-ares 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.12
main
c-ares-static 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.12
main
c-ares-dev 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.12
main
c-ares-doc 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.12
main
c-ares 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.13
main
c-ares 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.13
main
c-ares-doc 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.13
main
c-ares-dev 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.13
main
c-ares-static 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.14
main
c-ares 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.14
main
c-ares-static 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.14
main
c-ares-dev 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.14
main
c-ares-doc 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.15
main
c-ares 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.15
main
c-ares-doc 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.15
main
c-ares-static 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.15
main
c-ares-dev 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.16
main
c-ares-dev 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.16
main
c-ares 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.16
main
c-ares-doc 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.16
main
c-ares-static 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.17
main
c-ares 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.17
main
c-ares-doc 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.17
main
c-ares-utils 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.17
main
c-ares-dev 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux Edge
main
c-ares-doc 1.19.0 - clandmeter@alpinelinux.org
Alpine Linux Edge
main
c-ares-utils 1.19.0 - clandmeter@alpinelinux.org
Alpine Linux Edge
main
c-ares 1.19.0 - clandmeter@alpinelinux.org
Alpine Linux Edge
main
c-ares-static 1.19.0 - clandmeter@alpinelinux.org
Alpine Linux Edge
main
c-ares-dev 1.19.0 - clandmeter@alpinelinux.org
ALT Linux p9 c-ares 1.17.2 System/Libraries rider@altlinux.org
ALT Linux p10 c-ares 1.18.1 System/Libraries rider@altlinux.org
ALT Sisyphus c-ares 1.19.0 System/Libraries rider@altlinux.org
Amazon Linux 1
updates
c-ares 1.17.2 Unspecified -
Amazon Linux 1
main
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
updates
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
AOSC c-ares 1.14.0 Potentially vulnerable libs fallback-mnt-aosc@repology
Apertis v2020
v2020/target
c-ares 1.14.0 Potentially vulnerable main gjasny@googlemail.com
Apertis v2021
v2021/target
c-ares 1.14.0 Potentially vulnerable main gjasny@googlemail.com
Apertis v2022
v2022/target
c-ares 1.17.1 Potentially vulnerable main gjasny@googlemail.com
Apertis v2023
v2023/target
c-ares 1.17.1 Potentially vulnerable - gjasny@googlemail.com
Apertis v2024 Development
v2024dev1/target
c-ares 1.17.1 Potentially vulnerable - gjasny@googlemail.com
Arch
extra
c-ares 1.19.0 - -
Arch Linux 32 i486
extra
c-ares 1.19.0 - -
Arch Linux 32 i686
extra
c-ares 1.19.0 - -
Arch Linux 32 pentium4
extra
c-ares 1.19.0 - -
Arch Linux ARM aarch64
extra
c-ares 1.19.0 - -
Arch Linux ARM armv7h
extra
c-ares 1.19.0 - -
ArchPOWER powerpc c-ares 1.18.1 - -
ArchPOWER powerpc64le c-ares 1.18.1 - -
ArchPOWER riscv64 c-ares 1.18.1 - -
AUR mingw-w64-c-ares 1.15.0 Potentially vulnerable - fallback-mnt-aur@repology
Artix
world
c-ares 1.19.0 - -
Astra Orel Stable
main
c-ares 1.12.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Ataraxia GNU/Linux c-ares 1.17.1 Potentially vulnerable libs nagakamira@gmail.com
CentOS 6
os
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
CentOS 7
os
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
CentOS 8
BaseOS
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries bugs@centos.org
CentOS Stream 8
BaseOS
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries bugs@centos.org
CentOS Stream 8
BaseOS
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries bugs@centos.org
CentOS Stream 9
BaseOS
c-ares 1.17.1 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
c-ares 1.17.1 Potentially vulnerable Unspecified builder@centos.org
ConanCenter c-ares 1.19.0 - -
ConanCenter c-ares 1.18.1 - -
ConanCenter c-ares 1.17.2 - -
ConanCenter c-ares 1.17.1 Potentially vulnerable - -
ConanCenter c-ares 1.16.1 Potentially vulnerable - -
ConanCenter c-ares 1.15.0 Potentially vulnerable - -
ConanCenter c-ares 1.14.0 Potentially vulnerable - -
CRUX 3.4
opt
c-ares 1.15.0 Potentially vulnerable - crux@romster.me
CRUX 3.5
opt
c-ares 1.17.1 Potentially vulnerable - crux@romster.me
CRUX 3.6
opt
c-ares 1.18.1 - crux@romster.me
CRUX 3.7
opt
c-ares 1.19.0 - crux@romster.me
Cygwin c-ares-debuginfo 1.14.0 Potentially vulnerable Debug orphaned@cygwin
Cygwin libcares-devel 1.14.0 Potentially vulnerable Libs orphaned@cygwin
Cygwin libcares2 1.14.0 Potentially vulnerable Libs orphaned@cygwin
Cygwin mingw64-i686-c-ares 1.14.0 Potentially vulnerable Devel orphaned@cygwin
Cygwin mingw64-x86_64-c-ares 1.14.0 Potentially vulnerable Devel orphaned@cygwin
Debian 9
stretch/main
c-ares 1.12.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Debian 9
stretch/updates/main
c-ares 1.12.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Debian 9 Backports
stretch-backports/main
c-ares 1.14.0 Potentially vulnerable misc gjasny@googlemail.com
Debian 10
buster/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Debian 10
buster/updates/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Debian 10 Backports
buster-backports/main
c-ares 1.17.1 Potentially vulnerable misc gjasny@googlemail.com, blade@debian.org
Debian 11
bullseye-security/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Debian 11
bullseye/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Debian 12
bookworm/main
c-ares 1.18.1 libs gjasny@googlemail.com
Debian Janitor - Releases c-ares 1.19.0 - gjasny@googlemail.com
Debian Janitor - Snapshots c-ares 1.18.1+git20220503.1.810c232 - gjasny@googlemail.com
Debian Unstable
sid/main
c-ares 1.18.1 libs gjasny@googlemail.com
Debian Experimental
experimental/main
c-ares 1.19.0 libs gjasny@googlemail.com
Deepin
main
c-ares 1.14.0.2 Potentially vulnerable libs gjasny@googlemail.com
Deepin
main
c-ares 1.14.0.1 Potentially vulnerable - gjasny@googlemail.com
Devuan 1.0
jessie/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Devuan 2.0
ascii/main
c-ares 1.12.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Devuan 3.0
beowulf/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Devuan 4.0
chimaera/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Devuan Unstable
unstable/main
c-ares 1.18.1 libs gjasny@googlemail.com
DPorts dns/c-ares 1.18.1 dns zi@freebsd.org
Entware
aarch64-k3.10
libcares 1.18.1 libs karlp@etactica.com
Entware
armv5sf-k3.2
libcares 1.18.1 libs karlp@etactica.com
Entware
armv7sf-k2.6
libcares 1.18.1 libs karlp@etactica.com
Entware
armv7sf-k3.2
libcares 1.18.1 libs karlp@etactica.com
Entware
mipselsf-k3.4
libcares 1.18.1 libs karlp@etactica.com
Entware
mipssf-k3.4
libcares 1.18.1 libs karlp@etactica.com
Entware
x64-k3.2
libcares 1.18.1 libs karlp@etactica.com
EuroLinux 8
baseos
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
EuroLinux 9
baseos
c-ares 1.17.1 Potentially vulnerable Unspecified -
Exherbo
arbor
net-dns/c-ares 1.19.0 net-dns fallback-mnt-exherbo@repology
Fedora 26
updates
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 26
release
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Fedora 26
release
mingw-c-ares 1.12.0 Potentially vulnerable Unspecified -
Fedora 27
release
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Fedora 27
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 28
release
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Fedora 28
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 29
release
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Fedora 29
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 30
release
c-ares 1.15.0 Potentially vulnerable Unspecified -
Fedora 30
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 31
release
c-ares 1.15.0 Potentially vulnerable Unspecified -
Fedora 31
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 32
updates
mingw-c-ares 1.17.1 Potentially vulnerable Unspecified -
Fedora 32
updates
c-ares 1.17.0 Potentially vulnerable Unspecified -
Fedora 32
release
c-ares 1.15.0 Potentially vulnerable Unspecified -
Fedora 32
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 33
updates
c-ares 1.17.2 Unspecified -
Fedora 33
updates
mingw-c-ares 1.17.2 Unspecified -
Fedora 33
release
c-ares 1.16.1 Potentially vulnerable Unspecified -
Fedora 33
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 34
updates
c-ares 1.17.2 Unspecified -
Fedora 34
updates
mingw-c-ares 1.17.2 Unspecified -
Fedora 34
release
c-ares 1.17.1 Potentially vulnerable Unspecified -
Fedora 34
release
mingw-c-ares 1.17.1 Potentially vulnerable Unspecified -
Fedora 35
release
c-ares 1.17.2 Unspecified -
Fedora 35
release
mingw-c-ares 1.17.2 Unspecified -
Fedora 36
updates
c-ares 1.19.0 Unspecified -
Fedora 36
release
c-ares 1.17.2 Unspecified -
Fedora 36
release
mingw-c-ares 1.17.2 Unspecified -
Fedora 37
updates
c-ares 1.19.0 Unspecified -
Fedora 37
release
c-ares 1.17.2 Unspecified -
Fedora 37
release
mingw-c-ares 1.17.2 Unspecified -
Fedora 38
development
c-ares 1.19.0 Unspecified -
Fedora 38
development
mingw-c-ares 1.17.2 Unspecified -
Fedora Rawhide
development
c-ares 1.19.0 Unspecified -
Fedora Rawhide
development
mingw-c-ares 1.17.2 Unspecified -
FreeBSD Ports dns/c-ares 1.19.0 dns zi@freebsd.org
Gentoo net-dns/c-ares 1.19.0 net-dns base-system@gentoo.org
Gentoo net-dns/c-ares 1.18.1 net-dns base-system@gentoo.org
GNU Guix c-ares 1.18.1 - -
GNU Guix c-ares 1.17.2 - -
GNU Guix c-ares 1.17.2 - -
GoboLinux C-Ares 1.16.1 Potentially vulnerable - -
HaikuPorts master net-dns/c_ares 1.18.1 net-dns -
HaikuPorts master net-dns/c_ares 1.10.0 Potentially vulnerable net-dns -
Homebrew c-ares 1.19.0 - -
HP-UX 11.31
ia64_64
c_ares 1.19.0 - -
HP-UX 11.31
hppa_32
c_ares 1.16.1 Potentially vulnerable - -
HP-UX 11.31
ia64_64
c_ares 1.16.1 Potentially vulnerable - -
HP-UX 11.31
hppa_32
c_ares 1.4.0 Potentially vulnerable - -
HP-UX 11.31
ia64_32
c_ares 1.4.0 Potentially vulnerable - -
IBM i c-ares 1.17.2 Unspecified -
Kali Linux Rolling
main
c-ares 1.18.1 libs gjasny@googlemail.com
KaOS
main
c-ares 1.19.0 - demm@kaosx.us
LiGurOS stable net-dns/c-ares 1.18.1 net-dns blueness@gentoo.org
LiGurOS stable net-dns/c-ares 1.17.2 net-dns blueness@gentoo.org
LiGurOS develop net-dns/c-ares 1.19.0 net-dns base-system@gentoo.org
LiGurOS develop net-dns/c-ares 1.18.1 net-dns base-system@gentoo.org
MacPorts c-ares 1.19.0 net toby@macports, tobypeterson@github
Mageia 7
core/updates
c-ares 1.17.1 Potentially vulnerable System/Libraries -
Mageia 7
core/release
c-ares 1.15.0 Potentially vulnerable System/Libraries -
Mageia 8
core/release
c-ares 1.17.1 Potentially vulnerable System/Libraries -
Mageia 8
core/updates
c-ares 1.17.1 Potentially vulnerable System/Libraries -
Mageia Cauldron
core/release
c-ares 1.19.0 System/Libraries -
Manjaro Stable
extra
c-ares 1.19.0 - -
Manjaro Testing
extra
c-ares 1.19.0 - -
Manjaro Unstable
extra
c-ares 1.19.0 - -
MidnightBSD mports dns/c-ares 1.19.0 dns -
MSYS2 mingw
x86_64
mingw-w64-x86_64-c-ares 1.19.0 - -
MSYS2 mingw
i686
mingw-w64-i686-c-ares 1.19.0 - -
MSYS2 msys2
x86_64
libcares-devel 1.19.0 development -
MSYS2 msys2
x86_64
libcares 1.19.0 libraries -
nixpkgs stable 21.11 c-ares 1.17.2 - fallback-mnt-nix@repology
nixpkgs stable 22.05 c-ares 1.18.1 - fallback-mnt-nix@repology
nixpkgs stable 22.11 c-ares 1.18.1 - fallback-mnt-nix@repology
nixpkgs stable 22.11 c-ares 1.18.1 - fallback-mnt-nix@repology
nixpkgs unstable c-ares 1.19.0 - fallback-mnt-nix@repology
nixpkgs unstable c-ares 1.19.0 - fallback-mnt-nix@repology
OpenBSD Ports net/libcares 1.18.1 net brad@comstyle.com
openEuler 20.03
source
c-ares 1.15.0 Potentially vulnerable Unspecified -
openEuler 22.03
source
c-ares 1.18.1 Unspecified -
OpenIndiana packages
hipster
c-ares 1.19.0 System/Libraries -
OpenIndiana packages
hipster
c-ares 1.18.1 System/Libraries -
openmamba
devel
libcares 1.19.0 System/Libraries silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
c-ares 1.15.0 Potentially vulnerable System/Libraries bero@lindev.ch
OpenMandriva 4.1
main/release
c-ares 1.15.0 Potentially vulnerable System/Libraries nobodydead@gmail.com
OpenMandriva 4.2
main/release
c-ares 1.17.1 Potentially vulnerable System/Libraries bero@lindev.ch
OpenMandriva 4.3
main/release
c-ares 1.18.1 System/Libraries alexander@mezon.ru
OpenMandriva Rolling
main/release
c-ares 1.18.1 System/Libraries bero+massbuild@lindev.ch
OpenMandriva Cooker
main/release
c-ares 1.18.1 System/Libraries bero+massbuild@lindev.ch
OpenPKG ares 1.19.0 DNS -
openSUSE Leap 42.3
main/oss
libcares2 1.9.1 Potentially vulnerable Development/Libraries/C and C++ -
openSUSE Leap 15.0
main/oss
c-ares 1.14.0 Potentially vulnerable Development/Libraries/C and C++ -
openSUSE Leap 15.1
updates/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
updates/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
updates/oss
c-ares-tests 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
updates/oss
c-ares-tests 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
updates/oss
c-ares 1.15.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
main/oss
c-ares 1.14.0 Potentially vulnerable Development/Libraries/C and C++ -
openSUSE Leap 15.2
updates/oss
c-ares 1.17.1 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares 1.17.1 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares-tests 1.17.1 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares-tests 1.17.1 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares-tests 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares-tests 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
main/oss
c-ares 1.15.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.3
main/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.4
main/oss
c-ares 1.17.1 Potentially vulnerable Unspecified -
openSUSE Leap 15.5
main/oss
c-ares 1.19.0 Unspecified -
openSUSE Tumbleweed
src-oss
c-ares 1.19.0 Unspecified -
OpenWrt 17.01 x86_64
packages
libcares 1.11.0 Potentially vulnerable libs karlp@remake.is
OpenWrt 18.06 x86_64
packages
libcares 1.14.0 Potentially vulnerable libs karlp@etactica.com
OpenWrt 19.07 x86_64
packages
libcares 1.15.0 Potentially vulnerable libs karlp@etactica.com
OpenWrt 21.02 x86_64
packages
libcares 1.17.2 libs karlp@etactica.com
OpenWrt 22.03 x86_64
packages
libcares 1.18.1 libs karlp@etactica.com
Parabola
extra
c-ares 1.19.0 - -
Pardus 17
main
c-ares 1.12.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Pardus 19
updates/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Pardus 19
main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Pardus 21
main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Pardus 21
updates/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Parrot
parrot/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Parrot
parrot-updates/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
PCLinuxOS c-ares 1.18.1 System/Libraries -
Pisi Linux
main
c-ares 1.18.1 library admins@pisilinux.org
pkgsrc current net/libcares 1.19.0 net pkgsrc-users@netbsd.org
PLD Linux c-ares 1.19.0 - -
PureOS Amber c-ares 1.14.0 Potentially vulnerable misc gjasny@googlemail.com
PureOS landing c-ares 1.18.1 misc pureos-project@lists.puri.sm
Raspbian Oldstable
main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Raspbian Stable
main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Raspbian Testing
main
c-ares 1.18.1 libs gjasny@googlemail.com
Ravenports c-ares 1.19.0 dns fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries infrastructure@rockylinux.org
Rocky Linux 9
AppStream
c-ares 1.17.1 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
c-ares 1.17.1 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2014.1
main/updates
c-ares 1.11.0 Potentially vulnerable - -
Rosa 2014.1
main/release
c-ares 1.10.0 Potentially vulnerable - -
Rosa 2016.1
main/updates
c-ares 1.14.0 Potentially vulnerable - -
Rosa 2016.1
main/release
c-ares 1.11.0 Potentially vulnerable - -
Rosa 2021.1
main/release
c-ares 1.18.1 System/Libraries alexander@mezon.ru
Rosa Server 6.9
base/release
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Scientific Linux 7.x c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
Slackware 15.0
slackware
c-ares 1.18.1 - volkerdi@slackware.com
Slackware current
slackware
c-ares 1.19.0 - volkerdi@slackware.com
Slackware64 15.0
slackware64
c-ares 1.18.1 - volkerdi@slackware.com
Slackware64 current
slackware64
c-ares 1.19.0 - volkerdi@slackware.com
Slackwarearm 15.0
slackware
c-ares 1.18.1 - volkerdi@slackware.com
SliTaz Cooking c-ares 1.18.1 network pascal.bellard@slitaz.org
SliTaz Cooking c-ares-dev 1.18.1 development pascal.bellard@slitaz.org
SliTaz Next c-ares 1.15.0 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Next c-ares-dev 1.15.0 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next c-ares 1.15.0 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Next c-ares-dev 1.15.0 Potentially vulnerable development pascal.bellard@slitaz.org
Spack c-ares master - fallback-mnt-spack@repology
Spack c-ares 1.15.0 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE c-ares 1.17.1 Potentially vulnerable extra/server base/system rene@t2-project.org
Termux c-ares 1.19.0 - termux@github
Trisquel 6.0
toutatis-security/main
c-ares 1.7.5 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Trisquel 6.0
toutatis-updates/main
c-ares 1.7.5 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Trisquel 6.0
toutatis/main
c-ares 1.7.5 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Trisquel 7.0
belenos-updates/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos-security/main
c-ares 1.10.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Trisquel 7.0
belenos/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Trisquel 7.0 backports
belenos-backports/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Trisquel 8.0
flidas-updates/main
c-ares 1.10.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Trisquel 8.0
flidas-security/main
c-ares 1.10.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Trisquel 8.0 backports
flidas-backports/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Trisquel 9.0
etiona-security/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona-security/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Trisquel 9.0
etiona-updates/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona-updates/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia/main
c-ares 1.15.0 Potentially vulnerable libs gjasny@googlemail.com
Trisquel 10.0
nabia-security/main
c-ares 1.15.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia-security/main
c-ares 1.15.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia-updates/main
c-ares 1.15.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia-updates/main
c-ares 1.15.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 11.0
aramo-updates/main
c-ares 1.18.1 libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 11.0
aramo-security/main
c-ares 1.18.1 libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 11.0
aramo/main
c-ares 1.18.1 libs gjasny@googlemail.com
Ubuntu 14.04
trusty-updates/main
c-ares 1.10.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Ubuntu 14.04
trusty/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Ubuntu 16.04
xenial-updates/main
c-ares 1.10.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Ubuntu 16.04
xenial/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Ubuntu 18.04
bionic-updates/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Ubuntu 20.04
focal-updates/main
c-ares 1.15.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
c-ares 1.15.0 Potentially vulnerable libs gjasny@googlemail.com
Ubuntu 22.04
jammy-updates/main
c-ares 1.18.1 libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy/main
c-ares 1.18.1 libs gjasny@googlemail.com
Ubuntu 22.10
kinetic/main
c-ares 1.18.1 libs gjasny@googlemail.com
Ubuntu 22.10
kinetic-updates/main
c-ares 1.18.1 libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 23.04
lunar/main
c-ares 1.18.1 libs gjasny@googlemail.com
Vcpkg c-ares 1.19.0 - -
Void Linux x86_64
x86_64
c-ares 1.18.1 - orphan@voidlinux.org
Void Linux x86_64
x86_64
c-ares-devel 1.18.1 - orphan@voidlinux.org
Wikidata c-ares 1.19.0 - -
yiffOS Knot c-ares 1.18.1 - evie@eviee.gay