Versions Packages Information History CVEs Badges Report

Versions for c-ares

286 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
c-ares-doc 1.16.1 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
c-ares-dbg 1.16.1 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
c-ares-dev 1.16.1 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
c-ares 1.16.1 Potentially vulnerable - awilfox@adelielinux.org
AIX Open Source Packages c-ares 1.15.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.14.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.13.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.12.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.10.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.10.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.9.1 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.9.1 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.8.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.8.0 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.5 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.5 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.4 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.4 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.1 Potentially vulnerable - -
AIX Open Source Packages c-ares 1.7.1 Potentially vulnerable - -
AlmaLinux 8
BaseOS
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries packager@cloudlinux.com
Alpine Linux 3.8
main
c-ares 1.14.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.8
main
c-ares-dev 1.14.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.8
main
c-ares-doc 1.14.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.9
main
c-ares-doc 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.9
main
c-ares 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.9
main
c-ares-dev 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.10
main
c-ares 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.10
main
c-ares-doc 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.10
main
c-ares-dev 1.15.0 Potentially vulnerable - clandmeter@gmail.com
Alpine Linux 3.11
main
c-ares-dev 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.11
main
c-ares-doc 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.11
main
c-ares 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.12
main
c-ares-static 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.12
main
c-ares-dev 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.12
main
c-ares-doc 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.12
main
c-ares 1.17.2 - clandmeter@gmail.com
Alpine Linux 3.13
main
c-ares 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.13
main
c-ares-doc 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.13
main
c-ares-dev 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.13
main
c-ares-static 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.14
main
c-ares 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.14
main
c-ares-static 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.14
main
c-ares-dev 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.14
main
c-ares-doc 1.17.2 - clandmeter@alpinelinux.org
Alpine Linux 3.15
main
c-ares 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.15
main
c-ares-doc 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.15
main
c-ares-static 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux 3.15
main
c-ares-dev 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux Edge
main
c-ares 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux Edge
main
c-ares-doc 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux Edge
main
c-ares-static 1.18.1 - clandmeter@alpinelinux.org
Alpine Linux Edge
main
c-ares-dev 1.18.1 - clandmeter@alpinelinux.org
ALT Linux p9 c-ares 1.17.2 System/Libraries rider@altlinux.org
ALT Linux p10 c-ares 1.17.2 System/Libraries rider@altlinux.org
ALT Sisyphus c-ares 1.18.1 System/Libraries rider@altlinux.org
Amazon Linux 1
updates
c-ares 1.17.2 Unspecified -
Amazon Linux 1
main
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
updates
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
AOSC c-ares 1.14.0 Potentially vulnerable libs fallback-mnt-aosc@repology
Apertis v2020
v2020/target
c-ares 1.14.0 Potentially vulnerable main gjasny@googlemail.com
Apertis v2021
v2021/target
c-ares 1.14.0 Potentially vulnerable main gjasny@googlemail.com
Apertis v2022 Development
v2022dev2/target
c-ares 1.17.1 Potentially vulnerable main gjasny@googlemail.com
Arch
extra
c-ares 1.18.1 - -
AUR mingw-w64-c-ares 1.15.0 Potentially vulnerable - fallback-mnt-aur@repology
Artix
world
c-ares 1.18.1 - -
Astra Orel Stable
main
c-ares 1.12.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Ataraxia GNU/Linux c-ares 1.17.1 Potentially vulnerable libs nagakamira@gmail.com
CentOS 6
os
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
CentOS 7
os
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
CentOS 8
BaseOS
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries bugs@centos.org
CentOS 8 Stream
BaseOS
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries bugs@centos.org
ConanCenter c-ares 1.17.2 - -
ConanCenter c-ares 1.17.1 Potentially vulnerable - -
ConanCenter c-ares 1.16.1 Potentially vulnerable - -
ConanCenter c-ares 1.15.0 Potentially vulnerable - -
ConanCenter c-ares 1.14.0 Potentially vulnerable - -
CRUX 3.4
opt
c-ares 1.15.0 Potentially vulnerable - crux@romster.me
CRUX 3.5
opt
c-ares 1.17.1 Potentially vulnerable - crux@romster.me
CRUX 3.6
opt
c-ares 1.18.1 - crux@romster.me
Cygwin c-ares-debuginfo 1.14.0 Potentially vulnerable Debug orphaned@cygwin
Cygwin libcares-devel 1.14.0 Potentially vulnerable Libs orphaned@cygwin
Cygwin libcares2 1.14.0 Potentially vulnerable Libs orphaned@cygwin
Cygwin mingw64-i686-c-ares 1.14.0 Potentially vulnerable Devel orphaned@cygwin
Cygwin mingw64-x86_64-c-ares 1.14.0 Potentially vulnerable Devel orphaned@cygwin
Debian 8
jessie/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Debian 9
stretch/main
c-ares 1.12.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Debian 9 Backports
stretch-backports/main
c-ares 1.14.0 Potentially vulnerable misc gjasny@googlemail.com
Debian 10
buster/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Debian 10 Backports
buster-backports/main
c-ares 1.17.1 Potentially vulnerable misc gjasny@googlemail.com, blade@debian.org
Debian 11
bullseye/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Debian 12
bookworm/main
c-ares 1.18.1 libs gjasny@googlemail.com
Debian Unstable
sid/main
c-ares 1.18.1 libs gjasny@googlemail.com
Deepin
main
c-ares 1.14.0.1 Potentially vulnerable - gjasny@googlemail.com
Devuan 1.0
jessie/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Devuan 2.0
ascii/main
c-ares 1.12.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Devuan 3.0
beowulf/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Devuan 4.0
chimaera/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Devuan Unstable
unstable/main
c-ares 1.18.1 libs gjasny@googlemail.com
DPorts dns/c-ares 1.17.2 dns zi@freebsd.org
Entware
aarch64-k3.10
libcares 1.18.1 libs karlp@etactica.com
Entware
armv5sf-k3.2
libcares 1.18.1 libs karlp@etactica.com
Entware
armv7sf-k2.6
libcares 1.18.1 libs karlp@etactica.com
Entware
armv7sf-k3.2
libcares 1.18.1 libs karlp@etactica.com
Entware
mipselsf-k3.4
libcares 1.18.1 libs karlp@etactica.com
Entware
mipssf-k3.4
libcares 1.18.1 libs karlp@etactica.com
Entware
x64-k3.2
libcares 1.18.1 libs karlp@etactica.com
Exherbo
arbor
net-dns/c-ares 1.18.1 net-dns fallback-mnt-exherbo@repology
Fedora 26
updates
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 26
release
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Fedora 26
release
mingw-c-ares 1.12.0 Potentially vulnerable Unspecified -
Fedora 27
release
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Fedora 27
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 28
release
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Fedora 28
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 29
release
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries -
Fedora 29
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 30
release
c-ares 1.15.0 Potentially vulnerable Unspecified -
Fedora 30
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 31
release
c-ares 1.15.0 Potentially vulnerable Unspecified -
Fedora 31
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 32
updates
mingw-c-ares 1.17.1 Potentially vulnerable Unspecified -
Fedora 32
updates
c-ares 1.17.0 Potentially vulnerable Unspecified -
Fedora 32
release
c-ares 1.15.0 Potentially vulnerable Unspecified -
Fedora 32
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 33
updates
c-ares 1.17.2 Unspecified -
Fedora 33
updates
mingw-c-ares 1.17.2 Unspecified -
Fedora 33
release
c-ares 1.16.1 Potentially vulnerable Unspecified -
Fedora 33
release
mingw-c-ares 1.13.0 Potentially vulnerable Unspecified -
Fedora 34
updates
c-ares 1.17.2 Unspecified -
Fedora 34
updates
mingw-c-ares 1.17.2 Unspecified -
Fedora 34
release
c-ares 1.17.1 Potentially vulnerable Unspecified -
Fedora 34
release
mingw-c-ares 1.17.1 Potentially vulnerable Unspecified -
Fedora 35
development
c-ares 1.17.2 Unspecified -
Fedora 35
development
mingw-c-ares 1.17.2 Unspecified -
Fedora Rawhide c-ares 1.17.2 Unspecified -
Fedora Rawhide mingw-c-ares 1.17.2 Unspecified -
FreeBSD Ports dns/c-ares 1.17.2 dns zi@freebsd.org
Funtoo 1.4
net-kit
net-dns/c-ares 1.17.2 net-dns blueness@gentoo.org
Funtoo 1.4
net-kit
net-dns/c-ares 1.16.1 Potentially vulnerable net-dns blueness@gentoo.org
Gentoo net-dns/c-ares 1.18.1 net-dns blueness@gentoo.org
Gentoo net-dns/c-ares 1.17.2 net-dns blueness@gentoo.org
GNU Guix c-ares 1.17.2 - -
GoboLinux C-Ares 1.16.1 Potentially vulnerable - -
HaikuPorts master net-dns/c_ares 1.17.2 net-dns -
HaikuPorts master net-dns/c_ares 1.10.0 Potentially vulnerable net-dns -
Homebrew c-ares 1.18.1 - -
HP-UX 11.31
ia64_64
c_ares 1.18.1 - -
HP-UX 11.31
hppa_32
c_ares 1.16.1 Potentially vulnerable - -
HP-UX 11.31
ia64_64
c_ares 1.16.1 Potentially vulnerable - -
HP-UX 11.31
hppa_32
c_ares 1.4.0 Potentially vulnerable - -
HP-UX 11.31
ia64_32
c_ares 1.4.0 Potentially vulnerable - -
Hyperbola
extra
c-ares 1.12.0 Potentially vulnerable - -
IBM i c-ares 1.17.2 Unspecified -
Kali Linux Rolling
main
c-ares 1.18.1 libs gjasny@googlemail.com
KaOS
main
c-ares 1.18.1 - demm@kaosx.us
LiGurOS stable net-dns/c-ares 1.18.1 net-dns blueness@gentoo.org
LiGurOS stable net-dns/c-ares 1.17.2 net-dns blueness@gentoo.org
LiGurOS develop net-dns/c-ares 1.18.1 net-dns blueness@gentoo.org
LiGurOS develop net-dns/c-ares 1.17.2 net-dns blueness@gentoo.org
MacPorts c-ares 1.18.1 net toby@macports, tobypeterson@github
Mageia 7
core/updates
c-ares 1.17.1 Potentially vulnerable System/Libraries -
Mageia 7
core/release
c-ares 1.15.0 Potentially vulnerable System/Libraries -
Mageia 8
core/updates
c-ares 1.17.1 Potentially vulnerable System/Libraries -
Mageia 8
core/release
c-ares 1.17.1 Potentially vulnerable System/Libraries -
Mageia Cauldron
core/release
c-ares 1.18.1 System/Libraries -
Manjaro Stable
extra
c-ares 1.18.1 - -
Manjaro Testing
extra
c-ares 1.18.1 - -
Manjaro Unstable
extra
c-ares 1.18.1 - -
MidnightBSD mports dns/c-ares 1.17.2 dns -
MSYS2 mingw
x86_64
mingw-w64-x86_64-c-ares 1.17.2 - -
MSYS2 mingw
i686
mingw-w64-i686-c-ares 1.17.2 - -
MSYS2 msys2
x86_64
libcares 1.18.1 libraries -
MSYS2 msys2
x86_64
libcares-devel 1.18.1 development -
MSYS2 msys2
i686
libcares 1.17.1 Potentially vulnerable libraries -
MSYS2 msys2
i686
libcares-devel 1.17.1 Potentially vulnerable development -
nixpkgs stable 21.05 c-ares 1.17.2 - fallback-mnt-nix@repology
nixpkgs stable 21.11 c-ares 1.17.2 - fallback-mnt-nix@repology
nixpkgs unstable c-ares 1.18.1 - fallback-mnt-nix@repology
OpenBSD Ports net/libcares 1.18.1 net brad@comstyle.com
openEuler 20.03
source
c-ares 1.15.0 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
c-ares 1.18.1 System/Libraries -
OpenIndiana packages
hipster
c-ares 1.17.2 System/Libraries -
openmamba
devel
libcares 1.18.1 System/Libraries silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
c-ares 1.15.0 Potentially vulnerable System/Libraries bero@lindev.ch
OpenMandriva Cooker
main/release
c-ares 1.18.1 System/Libraries alexander@mezon.ru
OpenPKG ares 1.18.1 DNS -
openSUSE Leap 42.3
main/oss
libcares2 1.9.1 Potentially vulnerable Development/Libraries/C and C++ -
openSUSE Leap 15.0
main/oss
c-ares 1.14.0 Potentially vulnerable Development/Libraries/C and C++ -
openSUSE Leap 15.1
updates/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
updates/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
updates/oss
c-ares-tests 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
updates/oss
c-ares-tests 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
updates/oss
c-ares 1.15.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.1
main/oss
c-ares 1.14.0 Potentially vulnerable Development/Libraries/C and C++ -
openSUSE Leap 15.2
updates/oss
c-ares 1.17.1 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares 1.17.1 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares-tests 1.17.1 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares-tests 1.17.1 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares-tests 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
updates/oss
c-ares-tests 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.2
main/oss
c-ares 1.15.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.3
main/oss
c-ares 1.17.0 Potentially vulnerable Unspecified -
openSUSE Leap 15.4
main/oss
c-ares 1.17.1 Potentially vulnerable Unspecified -
openSUSE Tumbleweed
src-oss
c-ares 1.18.1 Unspecified -
openSUSE server:irc Tumbleweed libcares2 1.13.0 Potentially vulnerable Development/Libraries/C and C++ -
OpenWrt 17.01 x86_64
packages
libcares 1.11.0 Potentially vulnerable libs karlp@remake.is
OpenWrt 18.06 x86_64
packages
libcares 1.14.0 Potentially vulnerable libs karlp@etactica.com
OpenWrt 19.07 x86_64
packages
libcares 1.15.0 Potentially vulnerable libs karlp@etactica.com
OpenWrt 21.02 x86_64
packages
libcares 1.17.2 libs karlp@etactica.com
Parabola
extra
c-ares 1.18.1 - -
Pardus 17
main
c-ares 1.12.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Pardus 19
main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Pardus 19
updates/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Pardus 21
updates/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Pardus 21
main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Parrot LTS
lts/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Parrot LTS
lts-updates/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Parrot Rolling
rolling/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
PCLinuxOS c-ares 1.18.1 System/Libraries -
Pisi Linux
main
c-ares 1.17.2 library admins@pisilinux.org
pkgsrc current net/libcares 1.18.1 net pkgsrc-users@netbsd.org
PLD Linux c-ares 1.18.1 - -
PureOS Amber c-ares 1.14.0 Potentially vulnerable misc gjasny@googlemail.com
PureOS landing c-ares 1.17.1 Potentially vulnerable misc gjasny@googlemail.com
Raspbian Oldstable
main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Raspbian Stable
main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Raspbian Testing
main
c-ares 1.18.1 libs gjasny@googlemail.com
Ravenports c-ares 1.18.1 dns fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
c-ares 1.13.0 Potentially vulnerable System Environment/Libraries infrastructure@rockylinux.org
Rosa 2014.1
main/updates
c-ares 1.11.0 Potentially vulnerable - -
Rosa 2014.1
main/release
c-ares 1.10.0 Potentially vulnerable - -
Rosa 2016.1
main/updates
c-ares 1.14.0 Potentially vulnerable - -
Rosa 2016.1
main/release
c-ares 1.11.0 Potentially vulnerable - -
Rosa 2019.1
main/release
c-ares 1.17.1 Potentially vulnerable System/Libraries m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
c-ares 1.10.0 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Scientific Linux 7.x c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x c-ares 1.10.0 Potentially vulnerable System Environment/Libraries -
Slackware current
slackware
c-ares 1.18.1 - volkerdi@slackware.com
Slackware64 current
slackware64
c-ares 1.18.1 - volkerdi@slackware.com
Slackwarearm current
slackware
c-ares 1.18.1 - volkerdi@slackware.com
SliTaz Cooking c-ares 1.15.0 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Cooking c-ares-dev 1.15.0 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next c-ares 1.15.0 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Next c-ares-dev 1.15.0 Potentially vulnerable development pascal.bellard@slitaz.org
Solus c-ares 1.15.0 Potentially vulnerable programming.library bmeyers@datadrake.com
Solus c-ares-dbginfo 1.15.0 Potentially vulnerable debug bmeyers@datadrake.com
Solus c-ares-devel 1.15.0 Potentially vulnerable programming.devel bmeyers@datadrake.com
Spack c-ares master - fallback-mnt-spack@repology
Spack c-ares 1.15.0 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE c-ares 1.17.1 Potentially vulnerable extra/server base/system rene@t2-project.org
Termux c-ares 1.18.1 - termux@github
Trisquel 6.0
toutatis/main
c-ares 1.7.5 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Trisquel 6.0
toutatis-updates/main
c-ares 1.7.5 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Trisquel 7.0
belenos-updates/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Trisquel 7.0 backports
belenos-backports/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas-updates/main
c-ares 1.10.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Trisquel 8.0
flidas/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Trisquel 8.0 backports
flidas-backports/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Trisquel 9.0
etiona/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Trisquel 9.0
etiona-updates/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia/main
c-ares 1.15.0 Potentially vulnerable libs gjasny@googlemail.com
Trisquel 10.0
nabia-updates/main
c-ares 1.15.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Ubuntu 14.04
trusty-updates/main
c-ares 1.10.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Ubuntu 16.04
xenial-updates/main
c-ares 1.10.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, gjasny@googlemail.com
Ubuntu 16.04
xenial/main
c-ares 1.10.0 Potentially vulnerable libs andreas@debian.org, gjasny@googlemail.com
Ubuntu 18.04
bionic-updates/main
c-ares 1.14.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/main
c-ares 1.14.0 Potentially vulnerable libs gjasny@googlemail.com
Ubuntu 20.04
focal-updates/main
c-ares 1.15.0 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
c-ares 1.15.0 Potentially vulnerable libs gjasny@googlemail.com
Ubuntu 21.04
hirsute-updates/main
c-ares 1.17.1 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 21.04
hirsute/main
c-ares 1.17.1 Potentially vulnerable libs gjasny@googlemail.com
Ubuntu 21.10
impish/main
c-ares 1.17.1 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy/main
c-ares 1.18.1 libs gjasny@googlemail.com
Vcpkg c-ares 1.17.2 - -
Void Linux x86_64
x86_64
c-ares 1.17.2 - orphan@voidlinux.org
Void Linux x86_64
x86_64
c-ares-devel 1.17.2 - orphan@voidlinux.org
Wikidata c-ares 1.18.1 - -