Versions Packages Information History CVEs Related Badges Report

Versions for calibre

420 package(s) known

Repository Package name Version Category Maintainer(s)
ALT Linux p9 calibre 3.42.0 Potentially vulnerable File tools lav@altlinux.ru
ALT Linux p10 calibre 5.23.0 Potentially vulnerable File tools lav@altlinux.ru
ALT Sisyphus calibre 5.40.0 File tools lav@altlinux.ru
AOSC calibre 5.30.0 Potentially vulnerable doc fallback-mnt-aosc@repology
AppGet Calibre 4.20.0 Potentially vulnerable - -
Arch
community
calibre 5.42.0 - -
Arch Linux 32 i686
community
calibre 5.40.0 - -
Arch Linux 32 i686
community
calibre-common 4.23.0 Potentially vulnerable - -
Arch Linux 32 i686
community
calibre-python3 4.23.0 Potentially vulnerable - -
Arch Linux 32 pentium4
community
calibre 5.40.0 - -
Arch Linux 32 pentium4
community
calibre-python3 4.23.0 Potentially vulnerable - -
Arch Linux 32 pentium4
community
calibre-common 4.23.0 Potentially vulnerable - -
Arch Linux ARM aarch64
community
calibre 5.42.0 - -
Arch Linux ARM armv7h
community
calibre 5.42.0 - -
AUR calibre-git 5.34.0.r114.g0cf7af69ac - alerque@aur
Chocolatey Calibre 5.42.0 - -
Debian 8
jessie/main
calibre 2.5.0 Potentially vulnerable text little_miry@yahoo.es, mpitt@debian.org
Debian 9
stretch/main
calibre 2.75.1 Potentially vulnerable text little_miry@yahoo.es, mpitt@debian.org
Debian 9 Backports
stretch-backports/main
calibre 3.39.1 Potentially vulnerable misc norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
Debian 10
buster/main
calibre 3.39.1 Potentially vulnerable text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
Debian 11
bullseye/main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Debian 11 Backports
bullseye-backports/main
calibre 5.41.0 misc team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, sten@debian.org, yokota.hgml@gmail.com
Debian 12
bookworm/main
calibre 5.42.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Debian Unstable
sid/main
calibre 5.42.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Deepin
main
calibre 3.39.1.1+rb2 Potentially vulnerable - norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
Devuan 1.0
jessie/main
calibre 2.5.0 Potentially vulnerable text little_miry@yahoo.es, mpitt@debian.org
Devuan 2.0
ascii/main
calibre 2.75.1 Potentially vulnerable text little_miry@yahoo.es, mpitt@debian.org
Devuan 3.0
beowulf/main
calibre 3.39.1 Potentially vulnerable text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
Devuan 4.0
chimaera/main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Devuan Unstable
unstable/main
calibre 5.42.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
DistroWatch.com calibre 5.42.0 - -
DPorts deskutils/calibre 5.34.0 deskutils madpilot@freebsd.org
Exherbo
media
app-text/calibre 5.39.1 app-text fallback-mnt-exherbo@repology
Fedora 26
updates
calibre 3.19.0 Potentially vulnerable Applications/Multimedia -
Fedora 26
release
calibre 3.0.0 Potentially vulnerable Applications/Multimedia -
Fedora 27
updates
calibre 3.19.0 Potentially vulnerable Applications/Multimedia -
Fedora 27
release
calibre 3.4.0 Potentially vulnerable Applications/Multimedia -
Fedora 28
updates
calibre 3.34.0 Potentially vulnerable Applications/Multimedia -
Fedora 28
release
calibre 3.19.0 Potentially vulnerable Applications/Multimedia -
Fedora 29
updates
calibre 3.36.0 Potentially vulnerable Unspecified -
Fedora 29
release
calibre 3.29.0 Potentially vulnerable Applications/Multimedia -
Fedora 30
release
calibre 3.36.0 Potentially vulnerable Unspecified -
Fedora 30
updates
calibre 3.36.0 Potentially vulnerable Unspecified -
Fedora 31
updates
calibre 4.22.0 Potentially vulnerable Unspecified -
Fedora 31
release
calibre 4.0.0 Potentially vulnerable Unspecified -
Fedora 32
updates
calibre 4.22.0 Potentially vulnerable Unspecified -
Fedora 32
release
calibre 4.13.0 Potentially vulnerable Unspecified -
Fedora 33
release
calibre 4.23.0 Potentially vulnerable Unspecified -
Fedora 33
updates
calibre 4.23.0 Potentially vulnerable Unspecified -
Fedora 34
release
calibre 4.23.0 Potentially vulnerable Unspecified -
Fedora 34
updates
calibre 4.23.0 Potentially vulnerable Unspecified -
Fedora 35
updates
calibre 5.33.2 Unspecified -
Fedora 35
release
calibre 5.28.0 Potentially vulnerable Unspecified -
Fedora 36
updates
calibre 5.42.0 Unspecified -
Fedora 36
development
calibre 5.39.1 Unspecified -
Fedora Rawhide
development
calibre 5.42.0 Unspecified -
FreeBSD Ports deskutils/calibre 5.42.0 deskutils madpilot@freebsd.org
freshcode.club calibre 5.42 - -
Funtoo 1.4
text-kit
app-text/calibre-bin 5.42.0 app-text fallback-mnt-funtoo@repology
Funtoo 1.4
text-kit
app-text/calibre 4.22.0 Potentially vulnerable app-text fallback-mnt-funtoo@repology
Gentoo app-text/calibre 5.42.0 app-text zmedico@gentoo.org
Gentoo app-text/calibre 5.16.1 Potentially vulnerable app-text zmedico@gentoo.org
GNU Guix calibre 5.36.0 - -
HaikuPorts master app-text/calibre 5.32.0 app-text -
Homebrew Casks calibre 5.42.0 - -
just-install calibre latest - -
Kali Linux Rolling
main
calibre 5.42.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
KaOS
apps
calibre 5.42.0 - demm@kaosx.us
LiGurOS stable app-text/calibre 5.42.0 app-text zmedico@gentoo.org
LiGurOS stable app-text/calibre 5.16.1 Potentially vulnerable app-text zmedico@gentoo.org
LiGurOS develop app-text/calibre 5.42.0 app-text zmedico@gentoo.org
LiGurOS develop app-text/calibre 5.16.1 Potentially vulnerable app-text zmedico@gentoo.org
Mageia 7
core/release
calibre 3.42.0 Potentially vulnerable Office/Utilities -
Mageia 7
core/updates
calibre 3.42.0 Potentially vulnerable Office/Utilities -
Mageia 7
core/updates
calibre 3.42.0 Potentially vulnerable Office/Utilities -
Mageia 8
core/updates
calibre 4.23.0 Potentially vulnerable Office/Utilities -
Mageia 8
core/release
calibre 4.23.0 Potentially vulnerable Office/Utilities -
Mageia Cauldron
core/release
calibre 5.42.0 Office/Utilities -
Manjaro Stable
community
calibre 5.42.0 - -
Manjaro Testing
community
calibre 5.42.0 - -
Manjaro Unstable
community
calibre 5.42.0 - -
MX Linux MX-15
main
calibre 2.83.0 Potentially vulnerable text package.ninjas@getdeb.net, mpitt@debian.org
MX Linux MX-15 Testing
test
calibre 3.1.1 Potentially vulnerable text stevep@mxlinux.org, mpitt@debian.org
MX Linux MX-17
main
calibre 3.48.0 Potentially vulnerable text stevep@mxlinux.org, mpitt@debian.org, nsteeves@gmail.com
MX Linux MX-19
main
calibre 3.48.0 Potentially vulnerable text stevep@mxlinux.org, mpitt@debian.org, nsteeves@gmail.com
MX Linux MX-21 Testing
test
calibre 5.37.0 text stevep@mxlinux.org, mpitt@debian.org, norbert@preining.info, sten@debian.org, yokota.hgml@gmail.com
nixpkgs stable 21.05 calibre 5.17.0 Potentially vulnerable - mail@pascal-wittmann.de, torres.anderson.85@protonmail.com
nixpkgs stable 21.11 calibre 5.31.1 Potentially vulnerable - mail@pascal-wittmann.de, torres.anderson.85@protonmail.com
nixpkgs unstable calibre 5.42.0 - mail@pascal-wittmann.de, torres.anderson.85@protonmail.com
Npackd Stable Calibre 5.42 Text -
Npackd Stable Calibre 5.41 Text -
Npackd Stable Calibre 5.40 Text -
Npackd Stable Calibre 5.39.1 Text -
Npackd Stable Calibre 5.39 Text -
Npackd Stable Calibre 5.38 Text -
Npackd Stable Calibre 5.37 Text -
Npackd Stable Calibre 5.36 Text -
Npackd Stable Calibre 5.35 Text -
Npackd Stable Calibre 5.34 Text -
Npackd Stable Calibre 5.33.2 Text -
Npackd Stable Calibre 5.33 Text -
Npackd Stable Calibre 5.32 Text -
Npackd Stable Calibre 5.31.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.31 Potentially vulnerable Text -
Npackd Stable Calibre 5.30 Potentially vulnerable Text -
Npackd Stable Calibre 5.29 Potentially vulnerable Text -
Npackd Stable Calibre 5.28 Potentially vulnerable Text -
Npackd Stable Calibre 5.27 Potentially vulnerable Text -
Npackd Stable Calibre 5.26 Potentially vulnerable Text -
Npackd Stable Calibre 5.25 Potentially vulnerable Text -
Npackd Stable Calibre 5.24 Potentially vulnerable Text -
Npackd Stable Calibre 5.23 Potentially vulnerable Text -
Npackd Stable Calibre 5.22.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.22 Potentially vulnerable Text -
Npackd Stable Calibre 5.21 Potentially vulnerable Text -
Npackd Stable Calibre 5.20 Potentially vulnerable Text -
Npackd Stable Calibre 5.19 Potentially vulnerable Text -
Npackd Stable Calibre 5.18 Potentially vulnerable Text -
Npackd Stable Calibre 5.17 Potentially vulnerable Text -
Npackd Stable Calibre 5.16.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.16 Potentially vulnerable Text -
Npackd Stable Calibre 5.15 Potentially vulnerable Text -
Npackd Stable Calibre 5.14 Potentially vulnerable Text -
Npackd Stable Calibre 5.13 Potentially vulnerable Text -
Npackd Stable Calibre 5.12 Potentially vulnerable Text -
Npackd Stable Calibre 5.11 Potentially vulnerable Text -
Npackd Stable Calibre 5.10.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.10 Potentially vulnerable Text -
Npackd Stable Calibre 5.9 Potentially vulnerable Text -
Npackd Stable Calibre 5.8.1 Potentially vulnerable Text -
Npackd Stable Calibre 5.7.2 Potentially vulnerable Text -
Npackd Stable Calibre 5.7 Potentially vulnerable Text -
Npackd Stable Calibre 5.6 Potentially vulnerable Text -
Npackd Stable Calibre 5.5 Potentially vulnerable Text -
Npackd Stable Calibre 5.4.2 Potentially vulnerable Text -
Npackd Stable Calibre 5.3 Potentially vulnerable Text -
Npackd Stable Calibre 5.2 Potentially vulnerable Text -
Npackd Stable Calibre 5.0.1 Potentially vulnerable Text -
Npackd Stable Calibre 4.22 Potentially vulnerable Text -
Npackd Stable Calibre 4.21 Potentially vulnerable Text -
Npackd Stable Calibre 4.20 Potentially vulnerable Text -
Npackd Stable Calibre 4.19 Potentially vulnerable Text -
Npackd Stable Calibre 4.18 Potentially vulnerable Text -
Npackd Stable Calibre 4.17 Potentially vulnerable Text -
Npackd Stable Calibre 4.16 Potentially vulnerable Text -
Npackd Stable Calibre 4.15 Potentially vulnerable Text -
Npackd Stable Calibre 4.14 Potentially vulnerable Text -
Npackd Stable Calibre 4.13 Potentially vulnerable Text -
Npackd Stable Calibre 4.12 Potentially vulnerable Text -
Npackd Stable Calibre 4.11.2 Potentially vulnerable Text -
Npackd Stable Calibre 4.10.1 Potentially vulnerable Text -
Npackd Stable Calibre 4.9.1 Potentially vulnerable Text -
Npackd Stable Calibre 4.8 Potentially vulnerable Text -
Npackd Stable Calibre 4.7 Potentially vulnerable Text -
Npackd Stable Calibre 4.6 Potentially vulnerable Text -
Npackd Stable Calibre 4.5 Potentially vulnerable Text -
Npackd Stable Calibre 4.4 Potentially vulnerable Text -
Npackd Stable Calibre 4.3 Potentially vulnerable Text -
Npackd Stable Calibre 4.2 Potentially vulnerable Text -
Npackd Stable Calibre 4.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.48 Potentially vulnerable Text -
Npackd Stable Calibre 3.47.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.46 Potentially vulnerable Text -
Npackd Stable Calibre 3.45.2 Potentially vulnerable Text -
Npackd Stable Calibre 3.44 Potentially vulnerable Text -
Npackd Stable Calibre 3.43 Potentially vulnerable Text -
Npackd Stable Calibre 3.42 Potentially vulnerable Text -
Npackd Stable Calibre 3.41.3 Potentially vulnerable Text -
Npackd Stable Calibre 3.40.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.39.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.38.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.37 Potentially vulnerable Text -
Npackd Stable Calibre 3.36 Potentially vulnerable Text -
Npackd Stable Calibre 3.35 Potentially vulnerable Text -
Npackd Stable Calibre 3.34 Potentially vulnerable Text -
Npackd Stable Calibre 3.33.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.32 Potentially vulnerable Text -
Npackd Stable Calibre 3.31 Potentially vulnerable Text -
Npackd Stable Calibre 3.30 Potentially vulnerable Text -
Npackd Stable Calibre 3.29 Potentially vulnerable Text -
Npackd Stable Calibre 3.28 Potentially vulnerable Text -
Npackd Stable Calibre 3.27.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.26.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.25 Potentially vulnerable Text -
Npackd Stable Calibre 3.24.2 Potentially vulnerable Text -
Npackd Stable Calibre 3.23 Potentially vulnerable Text -
Npackd Stable Calibre 3.21 Potentially vulnerable Text -
Npackd Stable Calibre 3.20 Potentially vulnerable Text -
Npackd Stable Calibre 3.19 Potentially vulnerable Text -
Npackd Stable Calibre 3.18 Potentially vulnerable Text -
Npackd Stable Calibre 3.17 Potentially vulnerable Text -
Npackd Stable Calibre 3.16 Potentially vulnerable Text -
Npackd Stable Calibre 3.15 Potentially vulnerable Text -
Npackd Stable Calibre 3.14 Potentially vulnerable Text -
Npackd Stable Calibre 3.13 Potentially vulnerable Text -
Npackd Stable Calibre 3.12 Potentially vulnerable Text -
Npackd Stable Calibre 3.11.1 Potentially vulnerable Text -
Npackd Stable Calibre 3.10 Potentially vulnerable Text -
Npackd Stable Calibre 3.9 Potentially vulnerable Text -
Npackd Stable Calibre 3.8 Potentially vulnerable Text -
Npackd Stable Calibre 3.7 Potentially vulnerable Text -
Npackd Stable Calibre 3.6 Potentially vulnerable Text -
Npackd Stable Calibre 3.5 Potentially vulnerable Text -
Npackd Stable Calibre 3.4 Potentially vulnerable Text -
Npackd Stable Calibre 3.3 Potentially vulnerable Text -
Npackd Stable Calibre 3.2.1 Potentially vulnerable Text -
Npackd Stable Calibre 2.83 Potentially vulnerable Text -
Npackd Stable Calibre 2.78 Potentially vulnerable Text -
Npackd Stable Calibre 2.69 Potentially vulnerable Text -
Npackd Stable Calibre 2.62 Potentially vulnerable Text -
Npackd Stable Calibre 2.55 Potentially vulnerable Text -
Npackd Stable Calibre 2.49 Potentially vulnerable Text -
Npackd Stable Calibre 2.41 Potentially vulnerable Text -
Npackd Stable Calibre 2.32.1 Potentially vulnerable Text -
Npackd Stable Calibre 2.26 Potentially vulnerable Text -
Npackd Stable Calibre 2.15 Potentially vulnerable Text -
Npackd Stable Calibre 2.5 Potentially vulnerable Text -
Npackd Stable Calibre 1.43 Potentially vulnerable Text -
Npackd Stable Calibre 1.31 Potentially vulnerable Text -
Npackd Stable Calibre 1.19 Potentially vulnerable Text -
Npackd Stable Calibre 1.5 Potentially vulnerable Text -
Npackd Stable Calibre 0.9.43 Potentially vulnerable Text -
Npackd Stable Calibre 0.9.38 Potentially vulnerable Text -
Npackd Stable Calibre 0.9.26 Potentially vulnerable Text -
Npackd Stable Calibre 0.9.25 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.42 Text -
Npackd Stable64 Calibre 64 bit 5.41 Text -
Npackd Stable64 Calibre 64 bit 5.40 Text -
Npackd Stable64 Calibre 64 bit 5.39.1 Text -
Npackd Stable64 Calibre 64 bit 5.39 Text -
Npackd Stable64 Calibre 64 bit 5.38 Text -
Npackd Stable64 Calibre 64 bit 5.37 Text -
Npackd Stable64 Calibre 64 bit 5.36 Text -
Npackd Stable64 Calibre 64 bit 5.35 Text -
Npackd Stable64 Calibre 64 bit 5.34 Text -
Npackd Stable64 Calibre 64 bit 5.33.2 Text -
Npackd Stable64 Calibre 64 bit 5.33 Text -
Npackd Stable64 Calibre 64 bit 5.32 Text -
Npackd Stable64 Calibre 64 bit 5.31.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.31 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.30 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.29 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.28 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.27 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.26 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.25 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.24 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.23 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.22.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.22 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.21 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.20 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.19 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.18 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.17 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.16.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.16 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.15 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.14 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.13 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.12 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.11 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.10.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.10 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.9 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.8.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.7.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.3 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 5.0.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.22 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.21 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.20 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.19 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.18 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.17 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.16 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.15 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.14 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.13 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.12 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.11.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.10.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.9.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.8 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.7 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.6 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.5 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.4 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.3 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 4.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.48 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.47.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.46 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.45.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.44 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.43 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.42 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.41.3 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.40.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.39.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.38.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.37 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.36 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.35 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.34 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.33.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.32 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.31 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.30 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.29 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.28 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.27.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.26.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.25 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.24.2 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.23 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.21 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.20 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.19 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.18 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.17 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.16 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.15 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.14 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.13 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.12 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.11.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.10 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.9 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.8 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.7 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.6 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.5 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.4 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.3 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 3.2.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.83 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.78 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.69 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.62 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.55 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.49 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.41 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.32.1 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.26 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.15 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 2.5 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 1.43 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 1.31 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 1.19 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 1.5 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 0.9.43 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 0.9.38 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 0.9.26 Potentially vulnerable Text -
Npackd Stable64 Calibre 64 bit 0.9.25 Potentially vulnerable Text -
OpenBSD Ports textproc/calibre 5.39.1 textproc ports@openbsd.org
openmamba
devel
calibre 5.22.1 Potentially vulnerable Graphical Desktop/Applications/Multimedia ercole69@gmail.com
OpenMandriva 4.1
unsupported/release
calibre 4.6.0 Potentially vulnerable Office angrypenguinpoland@gmail.com
OpenMandriva 4.2
main/release
calibre 5.9.0 Potentially vulnerable Office bero@lindev.ch
OpenMandriva 4.2
unsupported/release
calibre 4.21.0 Potentially vulnerable Office bero@lindev.ch
OpenMandriva Rolling
main/release
calibre 5.35.0 Office bero@lindev.ch
OpenMandriva Rolling
unsupported/release
calibre 4.21.0 Potentially vulnerable Office bero@lindev.ch
OpenMandriva Cooker
main/release
calibre 5.41.0 Office mandian@tutanota.com
OpenMandriva Cooker
unsupported/release
calibre 4.21.0 Potentially vulnerable Office bero@lindev.ch
openSUSE Leap 42.3
main/oss
calibre 2.85.1 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.0
main/oss
calibre 3.23.0 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.1
main/oss
calibre 3.40.1 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.2
main/oss
calibre 3.48.0 Potentially vulnerable Productivity/Other -
openSUSE Leap 15.3
main/oss
calibre 3.48.0 Potentially vulnerable Productivity/Other -
openSUSE Tumbleweed
src-oss
calibre 5.42.0 Productivity/Other -
Pardus 17
main
calibre 2.75.1 Potentially vulnerable text little_miry@yahoo.es, mpitt@debian.org
Pardus 19
main
calibre 3.39.1 Potentially vulnerable text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
Pardus 21
main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Parrot
parrot/main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Parrot
parrot-updates/main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
PCLinuxOS calibre 5.42.0 Office -
pkgsrc current misc/calibre 5.40.0 misc pkgsrc-users@netbsd.org
PLD Linux calibre 4.20.0 Potentially vulnerable - -
PureOS Amber calibre 3.39.1 Potentially vulnerable misc norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
PureOS landing calibre 5.12.0 Potentially vulnerable misc team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Raspbian Oldstable
main
calibre 3.39.1 Potentially vulnerable text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com
Raspbian Stable
main
calibre 5.12.0 Potentially vulnerable text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Raspbian Testing
main
calibre 5.42.0 text team+calibre@tracker.debian.org, mpitt@debian.org, sten@debian.org, yokota.hgml@gmail.com
Rosa 2014.1
contrib/updates
calibre 2.85.1 Potentially vulnerable - -
Rosa 2014.1
contrib/release
calibre 1.34.0 Potentially vulnerable - -
Rosa 2016.1
contrib/updates
calibre 3.45.2 Potentially vulnerable - -
Rosa 2016.1
contrib/release
calibre 2.81.0 Potentially vulnerable - -
Rosa 2019.1
contrib/release
calibre 5.27.0 Potentially vulnerable Office m.novosyolov@rosalinux.ru
Scoop
extras
calibre-normal 5.42.0 - -
Scoop
extras
calibre 5.42.0 - -
SlackBuilds office/calibre 3.48.0 Potentially vulnerable office -
Solus calibre 5.42.0 office.viewers algent@protonmail.com
Solus calibre-dbginfo 5.42.0 debug algent@protonmail.com
Trisquel 6.0
toutatis-updates/main
calibre 0.8.38 Potentially vulnerable text trisquel-devel@listas.trisquel.info, mpitt@debian.org
Trisquel 6.0
toutatis/main
calibre 0.8.38 Potentially vulnerable universe/text little_miry@yahoo.es, mpitt@debian.org
Trisquel 7.0
belenos/main
calibre 1.25.0 Potentially vulnerable universe/text little_miry@yahoo.es, mpitt@debian.org
Trisquel 7.0
belenos-updates/main
calibre 1.25.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org
Trisquel 8.0
flidas-updates/main
calibre 2.55.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org
Trisquel 8.0
flidas/main
calibre 2.55.0 Potentially vulnerable universe/text little_miry@yahoo.es, mpitt@debian.org
Trisquel 9.0
etiona/main
calibre 3.21.0 Potentially vulnerable universe/text preining@debian.org, mpitt@debian.org
Trisquel 10.0
nabia/main
calibre 4.99.4+really4.12.0 Potentially vulnerable universe/text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com, yokota.hgml@gmail.com
Trisquel 10.0
nabia-updates/main
calibre 4.99.4+really4.12.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org, nsteeves@gmail.com, yokota.hgml@gmail.com
Ubuntu 14.04
trusty/universe
calibre 1.25.0 Potentially vulnerable universe/text little_miry@yahoo.es, mpitt@debian.org
Ubuntu 14.04
trusty-updates/universe
calibre 1.25.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org
Ubuntu 16.04
xenial/universe
calibre 2.55.0 Potentially vulnerable universe/text little_miry@yahoo.es, mpitt@debian.org
Ubuntu 16.04
xenial-updates/universe
calibre 2.55.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org
Ubuntu 18.04
bionic/universe
calibre 3.21.0 Potentially vulnerable universe/text preining@debian.org, mpitt@debian.org
Ubuntu 20.04
focal-updates/universe
calibre 4.99.4+really4.12.0 Potentially vulnerable universe/text ubuntu-devel-discuss@lists.ubuntu.com, mpitt@debian.org, nsteeves@gmail.com, yokota.hgml@gmail.com
Ubuntu 20.04
focal/universe
calibre 4.99.4+really4.12.0 Potentially vulnerable universe/text norbert@preining.info, mpitt@debian.org, nsteeves@gmail.com, yokota.hgml@gmail.com
Ubuntu 21.04
hirsute/universe
calibre 5.11.0 Potentially vulnerable universe/text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Ubuntu 21.10
impish/universe
calibre 5.25.0 Potentially vulnerable universe/text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, nsteeves@gmail.com, yokota.hgml@gmail.com
Ubuntu 22.04
jammy/universe
calibre 5.37.0 universe/text team+calibre@tracker.debian.org, mpitt@debian.org, norbert@preining.info, sten@debian.org, yokota.hgml@gmail.com
Void Linux x86_64
x86_64
calibre 5.40.0 - dem.procopiou@gmail.com
Wikidata Calibre 5.42.0 - -
winget calibre 5.42.0 calibre -
winget calibre 5.41.0 calibre -
winget calibre 5.40.0 calibre -
winget calibre 4.21.0 Potentially vulnerable calibre -