Versions Packages Information History CVEs Related Badges Report

Packages for unbound

439 package(s) known

unbound

1.17.0 (1.17.0-r0)

unbound-dbg

1.17.0 (1.17.0-r0)

unbound-dev

1.17.0 (1.17.0-r0)

unbound-doc

1.17.0 (1.17.0-r0)

unbound-openrc

1.17.0 (1.17.0-r0)

unbound-python

1.17.0 (1.17.0-r0)
AlmaLinux 8
AppStream

unbound

1.16.2 Potentially vulnerable (1.16.2-2.el8)
AlmaLinux 9
AppStream

unbound

1.16.2 Potentially vulnerable (1.16.2-2.el9)

py-unbound

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-dbg

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-dev

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-doc

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-libs

1.7.3 Potentially vulnerable (1.7.3-r2)

unbound-migrate

1.7.3 Potentially vulnerable (1.7.3-r2)

py-unbound

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-dbg

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-dev

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-doc

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-libs

1.8.3 Potentially vulnerable (1.8.3-r4)

unbound-migrate

1.8.3 Potentially vulnerable (1.8.3-r4)

py-unbound

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-dbg

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-dev

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-doc

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-libs

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-migrate

1.9.1 Potentially vulnerable (1.9.1-r8)

unbound-openrc

1.9.1 Potentially vulnerable (1.9.1-r8)

py-unbound

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-dbg

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-dev

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-doc

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-libs

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-migrate

1.9.6 Potentially vulnerable (1.9.6-r1)

unbound-openrc

1.9.6 Potentially vulnerable (1.9.6-r1)

py-unbound

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-dbg

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-dev

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-doc

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-libs

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-migrate

1.10.1 Potentially vulnerable (1.10.1-r0)

unbound-openrc

1.10.1 Potentially vulnerable (1.10.1-r0)

py-unbound

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-dbg

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-dev

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-doc

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-libs

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-migrate

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-openrc

1.13.2 Potentially vulnerable (1.13.2-r0)

py-unbound

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-dbg

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-dev

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-doc

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-libs

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-migrate

1.13.2 Potentially vulnerable (1.13.2-r0)

unbound-openrc

1.13.2 Potentially vulnerable (1.13.2-r0)

py-unbound

1.13.2 Potentially vulnerable (1.13.2-r2)

unbound

1.13.2 Potentially vulnerable (1.13.2-r2)

unbound-dbg

1.13.2 Potentially vulnerable (1.13.2-r2)

unbound-dev

1.13.2 Potentially vulnerable (1.13.2-r2)

unbound-doc

1.13.2 Potentially vulnerable (1.13.2-r2)

unbound-libs

1.13.2 Potentially vulnerable (1.13.2-r2)

unbound-migrate

1.13.2 Potentially vulnerable (1.13.2-r2)

unbound-openrc

1.13.2 Potentially vulnerable (1.13.2-r2)

py-unbound

1.15.0 Potentially vulnerable (1.15.0-r0)

unbound

1.15.0 Potentially vulnerable (1.15.0-r0)

unbound-dbg

1.15.0 Potentially vulnerable (1.15.0-r0)

unbound-dev

1.15.0 Potentially vulnerable (1.15.0-r0)

unbound-doc

1.15.0 Potentially vulnerable (1.15.0-r0)

unbound-libs

1.15.0 Potentially vulnerable (1.15.0-r0)

unbound-migrate

1.15.0 Potentially vulnerable (1.15.0-r0)

unbound-openrc

1.15.0 Potentially vulnerable (1.15.0-r0)

py-unbound

1.17.0 (1.17.0-r0)

unbound

1.17.0 (1.17.0-r0)

unbound-dbg

1.17.0 (1.17.0-r0)

unbound-dev

1.17.0 (1.17.0-r0)

unbound-doc

1.17.0 (1.17.0-r0)

unbound-libs

1.17.0 (1.17.0-r0)

unbound-migrate

1.17.0 (1.17.0-r0)

unbound-openrc

1.17.0 (1.17.0-r0)

py-unbound

1.17.0 (1.17.0-r1)

unbound

1.17.0 (1.17.0-r1)

unbound-dbg

1.17.0 (1.17.0-r1)

unbound-dev

1.17.0 (1.17.0-r1)

unbound-doc

1.17.0 (1.17.0-r1)

unbound-libs

1.17.0 (1.17.0-r1)

unbound-migrate

1.17.0 (1.17.0-r1)

unbound-openrc

1.17.0 (1.17.0-r1)

unbound

1.17.0 (1.17.0-alt1)

unbound

1.17.0 (1.17.0-alt1)

unbound

1.17.0 (1.17.0-alt1)

unbound

1.6.6 Potentially vulnerable (1.6.6-1.4.amzn1)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.6.6 Potentially vulnerable (1.6.6-1.5.amzn1)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.4.20 Potentially vulnerable (1.4.20-23.3.amzn1)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.7.3 Potentially vulnerable (1.7.3-15.amzn2.0.2)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • Unspecified
  • License:
    • BSD
  • Link(s):

unbound

1.7.3 Potentially vulnerable (1.7.3-15.amzn2.0.3)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • Unspecified
  • License:
    • BSD
  • Link(s):

unbound

1.7.3 Potentially vulnerable (1.7.3-15.amzn2.0.4)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • Unspecified
  • License:
    • BSD
  • Link(s):

unbound

1.7.3 Potentially vulnerable (1.7.3-15.amzn2.0.1)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • Unspecified
  • License:
    • BSD
  • Link(s):

unbound

1.6.6 Potentially vulnerable (1.6.6-5.amzn2)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.6.6 Potentially vulnerable (1.6.6-1.amzn2.0.2)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.6.6 Potentially vulnerable (1.6.6-1.amzn2.0.3)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.4.20 Potentially vulnerable (1.4.20-34.amzn2)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.9.5 Potentially vulnerable (1.9.5-4)
Apertis v2020
v2020/development

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)
Apertis v2021
v2021/development

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)
Apertis v2022
v2022/development

unbound

1.13.1 Potentially vulnerable (1.13.1-1apertis1)
Apertis v2023 Development
v2023dev1/development

unbound

1.13.1 Potentially vulnerable (1.13.1-1apertis1)

Unbound DNS resolver

1.10.1 Potentially vulnerable
Arch
community

unbound

1.17.0 (1.17.0-3)

unbound

1.15.0 Potentially vulnerable (1.15.0-1.0)

unbound

1.14.0 Potentially vulnerable (1.14.0-2.0)

unbound

1.14.0 Potentially vulnerable (1.14.0-2.0)

unbound

1.17.0 (1.17.0-3)

unbound

1.17.0 (1.17.0-3)

unbound

1.16.2 Potentially vulnerable (1.16.2-1)
  • Summary:
    Validating, recursive, and caching DNS resolver
  • License:
    • BSD
  • Link(s):

unbound

1.16.2 Potentially vulnerable (1.16.2-1)
  • Summary:
    Validating, recursive, and caching DNS resolver
  • License:
    • BSD
  • Link(s):

unbound

1.16.2 Potentially vulnerable (1.16.2-1)
  • Summary:
    Validating, recursive, and caching DNS resolver
  • License:
    • BSD
  • Link(s):

unbound-git

1.14.0.r43.g79e755e1 (1.14.0.r43.g79e755e1-1)
Artix
galaxy

unbound

1.17.0 (1.17.0-3)
  • Summary:
    Validating, recursive, and caching DNS resolver
  • License:
    • BSD
  • Link(s):

unbound

1.6.0 Potentially vulnerable (1.6.0-3+deb9u2)

unbound

1.13.1 Potentially vulnerable

unbound

1.4.20 Potentially vulnerable (1.4.20-23.el6_9.4)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):
CentOS 6
updates

unbound

1.4.20 Potentially vulnerable (1.4.20-26.el6_10.1)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):
CentOS 6
updates

unbound

1.4.20 Potentially vulnerable (1.4.20-29.el6_10.1)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.6.6 Potentially vulnerable (1.6.6-5.el7_8)
CentOS 8
AppStream

unbound

1.7.3 Potentially vulnerable (1.7.3-17.el8)
CentOS Stream 8
AppStream

unbound

1.16.2 Potentially vulnerable (1.16.2-2.el8)
CentOS Stream 8
AppStream

unbound

1.16.0 Potentially vulnerable (1.16.0-2.el8)
CentOS Stream 8
AppStream

unbound

1.7.3 Potentially vulnerable (1.7.3-15.el8)
CentOS Stream 8
AppStream

unbound

1.7.3 Potentially vulnerable (1.7.3-17.el8)
CentOS Stream 9
AppStream

unbound

1.16.2 Potentially vulnerable (1.16.2-2.el9)
CentOS Stream 9
AppStream

unbound

1.16.0 Potentially vulnerable (1.16.0-3.el9)
CentOS Stream 9
AppStream

unbound

1.13.1 Potentially vulnerable (1.13.1-12.el9)
CentOS Stream 9
AppStream

unbound

1.13.1 Potentially vulnerable (1.13.1-13.el9)
CentOS Stream 9
AppStream

unbound

1.13.1 Potentially vulnerable (1.13.1-9.el9)

Unbound (Install)

1.15.0 Potentially vulnerable

libunbound

1.9.2 Potentially vulnerable

unbound

1.9.2 Potentially vulnerable

libunbound

1.12.0 Potentially vulnerable

unbound

1.13.0 Potentially vulnerable

libunbound

1.16.3

unbound

1.16.3

libunbound

1.17.0

unbound

1.17.0

libunbound-common

1.6.2 Potentially vulnerable (1.6.2-1)

libunbound-devel

1.6.2 Potentially vulnerable (1.6.2-1)

libunbound2

1.6.2 Potentially vulnerable (1.6.2-1)

mingw64-i686-unbound

1.6.2 Potentially vulnerable (1.6.2-1)

mingw64-x86_64-unbound

1.6.2 Potentially vulnerable (1.6.2-1)

python2-unbound

1.6.2 Potentially vulnerable (1.6.2-1)

python3-unbound

1.6.2 Potentially vulnerable (1.6.2-1)

unbound

1.6.2 Potentially vulnerable (1.6.2-1)

unbound-debuginfo

1.6.2 Potentially vulnerable (1.6.2-1)
Debian 8
jessie/updates/main

unbound

1.4.22 Potentially vulnerable (1.4.22-3+deb8u4)
Debian 8
jessie/main

unbound

1.4.22 Potentially vulnerable (1.4.22-3+deb8u3)
Deepin
main

unbound

1.9.0.4 Potentially vulnerable (1.9.0.4-1+deepin)
Deepin
main

unbound

1.9.0.3 Potentially vulnerable (1.9.0.3-1)
Deepin
main

unbound

1.9.0.1 Potentially vulnerable (1.9.0.1-1+dde)
Devuan 1.0
jessie/main

unbound

1.4.22 Potentially vulnerable (1.4.22-3+deb8u3)
Devuan 2.0
ascii/main

unbound

1.6.0 Potentially vulnerable (1.6.0-3+deb9u2)
Devuan 3.0
beowulf/main

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)
Devuan 4.0
chimaera/main

unbound

1.13.1 Potentially vulnerable (1.13.1-1)
Devuan Unstable
unstable/main

unbound

1.17.0 (1.17.0-1)

dns/unbound

1.16.3
Entware
armv7sf-k2.6

libunbound

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k3.2

libunbound

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
aarch64-k3.10

libunbound

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv5sf-k3.2

libunbound

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipselsf-k3.4

libunbound

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipssf-k3.4

libunbound

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
x64-k3.2

libunbound

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k2.6

unbound-anchor

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
aarch64-k3.10

unbound-anchor

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv5sf-k3.2

unbound-anchor

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k3.2

unbound-anchor

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipselsf-k3.4

unbound-anchor

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipssf-k3.4

unbound-anchor

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
x64-k3.2

unbound-anchor

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k2.6

unbound-checkconf

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
aarch64-k3.10

unbound-checkconf

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv5sf-k3.2

unbound-checkconf

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k3.2

unbound-checkconf

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipselsf-k3.4

unbound-checkconf

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipssf-k3.4

unbound-checkconf

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
x64-k3.2

unbound-checkconf

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv5sf-k3.2

unbound-control

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k2.6

unbound-control

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
aarch64-k3.10

unbound-control

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k3.2

unbound-control

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipselsf-k3.4

unbound-control

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipssf-k3.4

unbound-control

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
x64-k3.2

unbound-control

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv5sf-k3.2

unbound-control-setup

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k2.6

unbound-control-setup

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
aarch64-k3.10

unbound-control-setup

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k3.2

unbound-control-setup

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipselsf-k3.4

unbound-control-setup

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipssf-k3.4

unbound-control-setup

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
x64-k3.2

unbound-control-setup

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv5sf-k3.2

unbound-daemon

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k2.6

unbound-daemon

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
aarch64-k3.10

unbound-daemon

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k3.2

unbound-daemon

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipselsf-k3.4

unbound-daemon

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipssf-k3.4

unbound-daemon

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
x64-k3.2

unbound-daemon

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv5sf-k3.2

unbound-host

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k2.6

unbound-host

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
aarch64-k3.10

unbound-host

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
armv7sf-k3.2

unbound-host

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipselsf-k3.4

unbound-host

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
mipssf-k3.4

unbound-host

1.16.1 Potentially vulnerable (1.16.1-1)
Entware
x64-k3.2

unbound-host

1.16.1 Potentially vulnerable (1.16.1-1)
EuroLinux 8
appstream

unbound

1.7.3 Potentially vulnerable (1.7.3-11.el8_2)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • Unspecified
  • License:
    • BSD
  • Link(s):
EuroLinux 8
appstream

unbound

1.7.3 Potentially vulnerable (1.7.3-14.el8)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • Unspecified
  • License:
    • BSD
  • Link(s):
EuroLinux 8
appstream

unbound

1.7.3 Potentially vulnerable (1.7.3-15.el8)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • Unspecified
  • License:
    • BSD
  • Link(s):
EuroLinux 8
appstream

unbound

1.7.3 Potentially vulnerable (1.7.3-17.el8)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • Unspecified
  • License:
    • BSD
  • Link(s):
Exherbo
cogitri

net-dns/unbound

1.15.0 Potentially vulnerable
Fedora 26
updates

unbound

1.7.0 Potentially vulnerable (1.7.0-2.fc26)
Fedora 26
release

unbound

1.6.3 Potentially vulnerable (1.6.3-1.fc26)
Fedora 27
updates

unbound

1.7.3 Potentially vulnerable (1.7.3-10.fc27)
Fedora 27
release

unbound

1.6.6 Potentially vulnerable (1.6.6-2.fc27)
Fedora 28
updates

unbound

1.7.3 Potentially vulnerable (1.7.3-10.fc28)
Fedora 28
release

unbound

1.7.0 Potentially vulnerable (1.7.0-4.fc28)
Fedora 29
updates

unbound

1.8.3 Potentially vulnerable (1.8.3-2.fc29)
Fedora 29
release

unbound

1.7.3 Potentially vulnerable (1.7.3-9.fc29)
Fedora 30
updates

unbound

1.9.6 Potentially vulnerable (1.9.6-1.fc30)
Fedora 30
release

unbound

1.8.3 Potentially vulnerable (1.8.3-4.fc30)
Fedora 31
updates

unbound

1.10.1 Potentially vulnerable (1.10.1-1.fc31)
Fedora 31
release

unbound

1.9.3 Potentially vulnerable (1.9.3-1.fc31)
Fedora 32
updates

unbound

1.10.1 Potentially vulnerable (1.10.1-1.fc32)
Fedora 32
release

unbound

1.9.6 Potentially vulnerable (1.9.6-2.fc32)
Fedora 33
updates

unbound

1.13.1 Potentially vulnerable (1.13.1-1.fc33)
Fedora 33
release

unbound

1.10.1 Potentially vulnerable (1.10.1-4.fc33)
Fedora 34
updates

unbound

1.13.2 Potentially vulnerable (1.13.2-1.fc34)
Fedora 34
release

unbound

1.13.1 Potentially vulnerable (1.13.1-1.fc34)
Fedora 35
updates

unbound

1.16.3 (1.16.3-1.fc35)
Fedora 35
release

unbound

1.13.2 Potentially vulnerable (1.13.2-1.fc35)
Fedora 36
updates

unbound

1.16.3 (1.16.3-2.fc36)
Fedora 36
release

unbound

1.13.2 Potentially vulnerable (1.13.2-5.fc36)
Fedora 37
release

unbound

1.16.3 (1.16.3-1.fc37)
Fedora 37
updates

unbound

1.16.3 (1.16.3-3.fc37)
Fedora Rawhide
development

unbound

1.17.0 (1.17.0-1.fc38)

dns/unbound

1.17.0
Funtoo 1.4
net-kit

net-dns/unbound

1.12.0 Potentially vulnerable

net-dns/unbound

1.16.3

unbound

1.17.0

Unbound

1.13.2 Potentially vulnerable

unbound

1.17.0
HP-UX 11.31
ia64_64

unbound

1.17.0
HP-UX 11.31
hppa_32

unbound

1.12.0 Potentially vulnerable
HP-UX 11.31
ia64_64

unbound

1.12.0 Potentially vulnerable
HP-UX 11.31
hppa_32

unbound

1.4.21 Potentially vulnerable

unbound

1.17.0 (1.17.0-1)

net-dns/unbound

1.17.0

net-dns/unbound

1.16.3

net-dns/unbound

1.17.0

net-dns/unbound

1.16.3

unbound

1.17.0
Mageia 7
core/updates

unbound

1.10.1 Potentially vulnerable (1.10.1-1.1.mga7)
Mageia 7
core/updates

unbound

1.10.1 Potentially vulnerable (1.10.1-1.mga7)
Mageia 7
core/updates

unbound

1.9.6 Potentially vulnerable (1.9.6-1.mga7)
Mageia 7
core/updates

unbound

1.9.5 Potentially vulnerable (1.9.5-1.mga7)
Mageia 7
core/updates

unbound

1.9.4 Potentially vulnerable (1.9.4-1.mga7)
Mageia 7
core/release

unbound

1.9.1 Potentially vulnerable (1.9.1-1.mga7)
Mageia 7
core/updates

unbound

1.9.1 Potentially vulnerable (1.9.1-1.1.mga7)
Mageia 8
core/updates

unbound

1.16.3 (1.16.3-1.mga8)
  • Summary:
    A validating, recursive, and caching DNS resolver
  • Category:
    • Networking/Other
  • License:
    • BSD
  • Link(s):
Mageia 8
core/updates

unbound

1.16.2 Potentially vulnerable (1.16.2-1.mga8)
  • Summary:
    A validating, recursive, and caching DNS resolver
  • Category:
    • Networking/Other
  • License:
    • BSD
  • Link(s):
Mageia 8
core/release

unbound

1.13.0 Potentially vulnerable (1.13.0-2.mga8)
  • Summary:
    A validating, recursive, and caching DNS resolver
  • Category:
    • Networking/Other
  • License:
    • BSD
  • Link(s):
Mageia Cauldron
core/release

unbound

1.16.3 (1.16.3-1.mga9)
Manjaro Stable
community

unbound

1.17.0 (1.17.0-2)
  • Summary:
    Validating, recursive, and caching DNS resolver
  • License:
    • BSD
  • Link(s):
Manjaro Testing
community

unbound

1.17.0 (1.17.0-2)
  • Summary:
    Validating, recursive, and caching DNS resolver
  • License:
    • BSD
  • Link(s):

unbound

1.17.0 (1.17.0-3)
  • Summary:
    Validating, recursive, and caching DNS resolver
  • License:
    • BSD
  • Link(s):

dns/unbound

1.16.2 Potentially vulnerable

mingw-w64-i686-unbound

1.17.0 (1.17.0-1)

mingw-w64-x86_64-unbound

1.17.0 (1.17.0-1)

unbound

1.9.3 Potentially vulnerable (1.9.3-1~mx19+1)

pyunbound

1.13.2 Potentially vulnerable

pyunbound

1.13.2 Potentially vulnerable

unbound

1.13.2 Potentially vulnerable

unbound

1.13.2 Potentially vulnerable

unbound

1.13.2 Potentially vulnerable

pyunbound

1.14.0 Potentially vulnerable

pyunbound

1.14.0 Potentially vulnerable

unbound

1.14.0 Potentially vulnerable

unbound

1.14.0 Potentially vulnerable

unbound

1.14.0 Potentially vulnerable

pyunbound

1.17.0

pyunbound

1.17.0

unbound

1.17.0

unbound

1.17.0

unbound

1.17.0

pyunbound

1.17.0

pyunbound

1.17.0

unbound

1.17.0

unbound

1.17.0

unbound

1.17.0

net/libunbound

1.17.0

unbound

1.7.3 Potentially vulnerable (1.7.3-14.oe1)

unbound

1.13.2 Potentially vulnerable (1.13.2-3.oe2203)
openmamba
devel

unbound

1.17.0 (1.17.0-1mamba)

unbound

1.17.0
openSUSE Leap 42.3
updates/oss

libunbound-devel-mini

1.5.10 Potentially vulnerable (1.5.10-4.3.1)

libunbound-devel-mini

1.5.10 Potentially vulnerable (1.5.10-3.1)
openSUSE Leap 42.3
updates/oss

unbound

1.5.10 Potentially vulnerable (1.5.10-4.3.1)

unbound

1.5.10 Potentially vulnerable (1.5.10-3.1)

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp150.1.3)
openSUSE Leap 15.0
updates/oss

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp150.2.3.1)
openSUSE Leap 15.0
updates/oss

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp150.2.6.1)

unbound

1.6.8 Potentially vulnerable (1.6.8-lp150.1.4)

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp151.7.1)
openSUSE Leap 15.1
updates/oss

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp151.8.3.1)

unbound

1.6.8 Potentially vulnerable (1.6.8-lp151.7.1)
openSUSE Leap 15.1
updates/oss

unbound

1.6.8 Potentially vulnerable (1.6.8-lp151.8.3.1)

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp152.8.7)
openSUSE Leap 15.2
updates/oss

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-lp152.9.3.1)

unbound

1.6.8 Potentially vulnerable (1.6.8-lp152.8.9)
openSUSE Leap 15.2
updates/oss

unbound

1.6.8 Potentially vulnerable (1.6.8-lp152.9.3.1)

libunbound-devel-mini

1.6.8 Potentially vulnerable (1.6.8-10.3.1)

unbound

1.6.8 Potentially vulnerable (1.6.8-10.3.1)

unbound

1.6.8 Potentially vulnerable (1.6.8-10.6.1)

libunbound-devel-mini

1.17.0 (1.17.0-1.1)

unbound

1.17.0 (1.17.0-1.1)

libunbound

1.6.8 Potentially vulnerable (1.6.8-3)

unbound

1.6.8 Potentially vulnerable (1.6.8-3)

unbound-anchor

1.6.8 Potentially vulnerable (1.6.8-3)

unbound-control

1.6.8 Potentially vulnerable (1.6.8-3)

unbound-control-setup

1.6.8 Potentially vulnerable (1.6.8-3)

unbound-host

1.6.8 Potentially vulnerable (1.6.8-3)

libunbound

1.10.1 Potentially vulnerable (1.10.1-1)

unbound

1.10.1 Potentially vulnerable (1.10.1-1)

unbound-anchor

1.10.1 Potentially vulnerable (1.10.1-1)

unbound-control

1.10.1 Potentially vulnerable (1.10.1-1)

unbound-control-setup

1.10.1 Potentially vulnerable (1.10.1-1)

unbound-host

1.10.1 Potentially vulnerable (1.10.1-1)

libunbound-heavy

1.13.1 Potentially vulnerable (1.13.1-1)

libunbound-light

1.13.1 Potentially vulnerable (1.13.1-1)

unbound-anchor

1.13.1 Potentially vulnerable (1.13.1-1)

unbound-checkconf

1.13.1 Potentially vulnerable (1.13.1-1)

unbound-control

1.13.1 Potentially vulnerable (1.13.1-1)

unbound-control-setup

1.13.1 Potentially vulnerable (1.13.1-1)

unbound-daemon

1.13.1 Potentially vulnerable (1.13.1-1)

unbound-daemon-heavy

1.13.1 Potentially vulnerable (1.13.1-1)

unbound-host

1.13.1 Potentially vulnerable (1.13.1-1)

libunbound

1.17.0 (1.17.0-1)

unbound-anchor

1.17.0 (1.17.0-1)

unbound-checkconf

1.17.0 (1.17.0-1)

unbound-control

1.17.0 (1.17.0-1)

unbound-control-setup

1.17.0 (1.17.0-1)

unbound-daemon

1.17.0 (1.17.0-1)

unbound-host

1.17.0 (1.17.0-1)
Parabola
community

unbound

1.17.0 (1.17.0-3)

unbound

1.6.0 Potentially vulnerable (1.6.0-3+deb9u2)

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)
Pardus 19
updates/main

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)

unbound

1.13.1 Potentially vulnerable (1.13.1-1)
Parrot
parrot/main

unbound

1.13.1 Potentially vulnerable (1.13.1-1)
Parrot
parrot-updates/main

unbound

1.13.1 Potentially vulnerable (1.13.1-1)

unbound

1.17.0 (1.17.0-1pclos2022)
  • Summary:
    A validating, recursive, and caching DNS resolver
  • Category:
    • Networking/Other

net/unbound

1.17.0

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)

unbound

1.13.1 Potentially vulnerable (1.13.1-1)

unbound

1.9.0 Potentially vulnerable (1.9.0-2+deb10u2)

unbound

1.13.1 Potentially vulnerable (1.13.1-1)

unbound

1.17.0 (1.17.0-1)
Rocky Linux 8
AppStream

unbound

1.16.2 Potentially vulnerable (1.16.2-2.el8)
Rosa 2014.1
contrib/updates

unbound

1.5.10 Potentially vulnerable (1.5.10-1)
Rosa 2014.1
contrib/release

unbound

1.4.17 Potentially vulnerable (1.4.17-2)
Rosa 2016.1
main/testing

unbound

1.12.0 Potentially vulnerable (1.12.0-1)
Rosa 2016.1
main/updates

unbound

1.12.0 Potentially vulnerable (1.12.0-1)
Rosa 2016.1
main/release

unbound

1.5.10 Potentially vulnerable (1.5.10-2)
Rosa 2021.1
main/release

unbound

1.12.0 Potentially vulnerable (1.12.0-2)
Rosa Server 6.9
base/release

unbound

1.4.20 Potentially vulnerable (1.4.20-23.res6.3)
Rosa Server 6.9
base/updates

unbound

1.4.20 Potentially vulnerable (1.4.20-23.res6.4)
Rosa Server 7.3
base/release

unbound

1.4.20 Potentially vulnerable (1.4.20-28.res7)
Rosa Server 7.5
base/release

unbound

1.6.6 Potentially vulnerable (1.6.6-1.res7)
Rosa Server 7.5
base/release

unbound

1.4.20 Potentially vulnerable (1.4.20-28.res7)

unbound

1.6.6 Potentially vulnerable (1.6.6-1.el7)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.6.6 Potentially vulnerable (1.6.6-3.el7)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.6.6 Potentially vulnerable (1.6.6-4.el7_8)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.6.6 Potentially vulnerable (1.6.6-5.el7_8)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.4.20 Potentially vulnerable (1.4.20-17.el7)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.4.20 Potentially vulnerable (1.4.20-19.el7)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.4.20 Potentially vulnerable (1.4.20-26.el7)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.4.20 Potentially vulnerable (1.4.20-28.el7)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.4.20 Potentially vulnerable (1.4.20-34.el7)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • System Environment/Daemons
  • License:
    • BSD
  • Link(s):

unbound

1.10.1 Potentially vulnerable

unbound-dev

1.10.1 Potentially vulnerable

unbound

1.7.3 Potentially vulnerable

unbound

1.7.3 Potentially vulnerable

unbound-dev

1.7.3 Potentially vulnerable

unbound-dev

1.7.3 Potentially vulnerable

unbound

1.10.1 Potentially vulnerable

unbound-dbginfo

1.10.1 Potentially vulnerable

unbound-devel

1.10.1 Potentially vulnerable

unbound

1.17.0
Trisquel 6.0
toutatis/main

unbound

1.4.16 Potentially vulnerable (1.4.16-1)
Trisquel 6.0 backports
toutatis-backports/main

unbound

1.4.18 Potentially vulnerable (1.4.18-1~ubuntu12.04.1)
Trisquel 7.0
belenos-updates/main

unbound

1.4.22 Potentially vulnerable (1.4.22-1ubuntu4.14.04.3)
Trisquel 7.0
belenos/main

unbound

1.4.22 Potentially vulnerable (1.4.22-1ubuntu4)
Trisquel 8.0
flidas-updates/main

unbound

1.6.7 Potentially vulnerable (1.6.7-1ubuntu2+8.0trisquel1)
Trisquel 8.0
flidas/main

unbound

1.5.8 Potentially vulnerable (1.5.8-1ubuntu1)
Trisquel 9.0
etiona-updates/main

unbound

1.6.7 Potentially vulnerable (1.6.7-1ubuntu2.6)
Trisquel 9.0
etiona/main

unbound

1.6.7 Potentially vulnerable (1.6.7-1ubuntu2)
Trisquel 10.0
nabia/main

unbound

1.9.4 Potentially vulnerable (1.9.4-2ubuntu1)
Trisquel 10.0
nabia-updates/main

unbound

1.9.4 Potentially vulnerable (1.9.4-2ubuntu1.4)
UBI 8
appstream

unbound

1.16.2 Potentially vulnerable (1.16.2-2.el8)
  • Summary:
    Validating, recursive, and caching DNS(SEC) resolver
  • Category:
    • Unspecified
  • License:
    • BSD
  • Link(s):
Ubuntu 14.04
trusty-updates/main

unbound

1.4.22 Potentially vulnerable (1.4.22-1ubuntu4.14.04.3)
Ubuntu 14.04
trusty/main

unbound

1.4.22 Potentially vulnerable (1.4.22-1ubuntu4)

libunbound

1.17.0 (1.17.0_1)

unbound

1.17.0 (1.17.0_1)

unbound-devel

1.17.0 (1.17.0_1)

Unbound

1.17.0