Versions Packages Information History CVEs Related Badges Report

Versions for kate

289 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
kate-project 22.04.2 - awilfox@adelielinux.org
Adélie Linux current
user
kate-lang 22.04.2 - awilfox@adelielinux.org
Adélie Linux current
user
kwrite 22.04.2 - awilfox@adelielinux.org
Adélie Linux current
user
kate-doc 22.04.2 - awilfox@adelielinux.org
Adélie Linux current
user
kate 22.04.2 - awilfox@adelielinux.org
Adélie Linux current
user
kwrite-doc 22.04.2 - awilfox@adelielinux.org
Adélie Linux current
user
kate-dbg 22.04.2 - awilfox@adelielinux.org
Adélie Linux current
user
kwrite-lang 22.04.2 - awilfox@adelielinux.org
Alpine Linux 3.11
community
kwrite-lang 19.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.11
community
kate-doc 19.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.11
community
kwrite 19.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.11
community
kate 19.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.11
community
kwrite-doc 19.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.11
community
kate-lang 19.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.12
community
kate-doc 20.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.12
community
kwrite 20.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.12
community
kwrite-lang 20.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.12
community
kate-lang 20.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.12
community
kate 20.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.12
community
kwrite-doc 20.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.13
community
kate 20.12.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.13
community
kwrite-lang 20.12.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.13
community
kate-lang 20.12.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.13
community
kwrite-doc 20.12.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.13
community
kwrite 20.12.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.13
community
kate-doc 20.12.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.14
community
kwrite-doc 21.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.14
community
kate 21.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.14
community
kwrite 21.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.14
community
kwrite-lang 21.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.14
community
kate-doc 21.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.14
community
kate-lang 21.04.2 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.15
community
kate-doc 21.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.15
community
kwrite-doc 21.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.15
community
kwrite-lang 21.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.15
community
kate-lang 21.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.15
community
kate 21.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.15
community
kwrite 21.08.3 Potentially vulnerable - bribbers@disroot.org
Alpine Linux 3.16
community
kate 22.04.3 - bribbers@disroot.org
Alpine Linux 3.16
community
kate-lang 22.04.3 - bribbers@disroot.org
Alpine Linux 3.16
community
kwrite 22.04.3 - bribbers@disroot.org
Alpine Linux 3.16
community
kwrite-lang 22.04.3 - bribbers@disroot.org
Alpine Linux 3.16
community
kate-doc 22.04.3 - bribbers@disroot.org
Alpine Linux 3.16
community
kwrite-doc 22.04.3 - bribbers@disroot.org
Alpine Linux 3.17
community
kate-common 22.08.3 - bribbers@disroot.org
Alpine Linux 3.17
community
kate 22.08.3 - bribbers@disroot.org
Alpine Linux 3.17
community
kwrite-lang 22.08.3 - bribbers@disroot.org
Alpine Linux 3.17
community
kwrite-doc 22.08.3 - bribbers@disroot.org
Alpine Linux 3.17
community
kate-lang 22.08.3 - bribbers@disroot.org
Alpine Linux 3.17
community
kate-doc 22.08.3 - bribbers@disroot.org
Alpine Linux 3.17
community
kwrite 22.08.3 - bribbers@disroot.org
Alpine Linux Edge
community
kwrite 22.12.3 - bribbers@disroot.org
Alpine Linux Edge
community
kate 22.12.3 - bribbers@disroot.org
Alpine Linux Edge
community
kwrite-doc 22.12.3 - bribbers@disroot.org
Alpine Linux Edge
community
kate-doc 22.12.3 - bribbers@disroot.org
Alpine Linux Edge
community
kwrite-lang 22.12.3 - bribbers@disroot.org
Alpine Linux Edge
community
kate-lang 22.12.3 - bribbers@disroot.org
Alpine Linux Edge
community
kate-common 22.12.3 - bribbers@disroot.org
ALT Linux p9 kde5-kate 19.12.3 Potentially vulnerable Editors zerg@altlinux.org
ALT Linux p9 kde4-kate 4.14.7 Potentially vulnerable Editors darktemplar@altlinux.org
ALT Linux p10 kde5-kate 22.12.2 Editors zerg@altlinux.org
ALT Sisyphus kde5-kate 22.12.3 Editors zerg@altlinux.org
AOSC kate 22.04.3 kde fallback-mnt-aosc@repology
Arch
extra
kate 22.12.3 - -
Arch Linux 32 i486
extra
kwrite 21.08.2 Potentially vulnerable - -
Arch Linux 32 i486
extra
kate 21.08.2 Potentially vulnerable - -
Arch Linux 32 i686
extra
kate 22.12.3 - -
Arch Linux 32 i686
extra
kwrite 22.04.3 - -
Arch Linux 32 pentium4
extra
kate 22.12.3 - -
Arch Linux 32 pentium4
extra
kwrite 22.04.3 - -
Arch Linux ARM aarch64
extra
kate 22.12.3 - -
Arch Linux ARM armv7h
extra
kate 22.12.3 - -
ArchPOWER powerpc kate 22.12.0 - -
ArchPOWER powerpc kate-debug 22.12.0 - -
ArchPOWER powerpc kwrite 22.04.3 - -
ArchPOWER powerpc64le kate-debug 22.12.0 - -
ArchPOWER powerpc64le kate 22.12.0 - -
ArchPOWER powerpc64le kwrite 22.04.3 - -
ArchPOWER riscv64 kate-debug 22.12.0 - -
ArchPOWER riscv64 kate 22.12.0 - -
ArchPOWER riscv64 kwrite 22.04.3 - -
AUR kate-git 21.07.70_r17988.g3d0d58325 - dr460nf1r3@aur
AUR kate-root 22.08.3 - mnabid@aur
Artix
world
kate 22.12.3 - -
Astra Orel Stable
main
kate4 4.14.3 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
CentOS 7
os
kate 4.10.5 Potentially vulnerable Unspecified -
Chocolatey Kate 22.12.1 - -
Cygwin kate 17.12.3 Potentially vulnerable Editors orphaned@cygwin
Cygwin kate-debuginfo 17.12.3 Potentially vulnerable Debug orphaned@cygwin
Cygwin kwrite 17.12.3 Potentially vulnerable Editors orphaned@cygwin
Cygwin kate4-debuginfo 4.14.3 Potentially vulnerable Debug orphaned@cygwin
Cygwin kate4-part 4.14.3 Potentially vulnerable Editors orphaned@cygwin
Debian 8
jessie/main
kate 4.14.2 Potentially vulnerable editors debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Debian 9
stretch/main
kate 16.08.3 Potentially vulnerable editors debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Debian 9
stretch/main
kate4 4.14.3 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Debian 10
buster/main
kate 18.08.0 Potentially vulnerable editors debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Debian 10
buster/main
kate4 4.14.3 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Debian 11
bullseye/main
kate 20.12.2 Potentially vulnerable editors debian-qt-kde@lists.debian.org, norbert@preining.info, sune@debian.org
Debian 12
bookworm/main
kate 22.12.3 editors debian-qt-kde@lists.debian.org, coucouf@debian.org
Debian Unstable
sid/main
kate 22.12.3 editors debian-qt-kde@lists.debian.org, coucouf@debian.org
Deepin
main
kate 18.08.0 Potentially vulnerable - debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Deepin
main
kate4 4.14.3 Potentially vulnerable - debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Devuan 1.0
jessie/main
kate 4.14.2 Potentially vulnerable editors debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Devuan 2.0
ascii/main
kate 16.08.3 Potentially vulnerable editors debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Devuan 2.0
ascii/main
kate4 4.14.3 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Devuan 3.0
beowulf/main
kate 18.08.0 Potentially vulnerable editors debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Devuan 3.0
beowulf/main
kate4 4.14.3 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Devuan 4.0
chimaera/main
kate 20.12.2 Potentially vulnerable editors debian-qt-kde@lists.debian.org, norbert@preining.info, sune@debian.org
Devuan Unstable
unstable/main
kate 22.12.3 editors debian-qt-kde@lists.debian.org, coucouf@debian.org
EPEL 8 kate 22.04.1 Unspecified -
EPEL 9 kate 22.04.1 Unspecified -
Exherbo
kde
kde/kate scm kde fallback-mnt-exherbo@repology
Exherbo
kde
kde/kate 22.12.3 kde fallback-mnt-exherbo@repology
Fedora 26
release
kate 17.04.1 Potentially vulnerable Unspecified -
Fedora 26
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 27
updates
kate 17.12.2 Potentially vulnerable Unspecified -
Fedora 27
release
kate 17.08.1 Potentially vulnerable Unspecified -
Fedora 27
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 28
updates
kate 18.08.3 Potentially vulnerable Unspecified -
Fedora 28
release
kate 17.12.2 Potentially vulnerable Unspecified -
Fedora 28
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 29
updates
kate 18.12.2 Potentially vulnerable Unspecified -
Fedora 29
release
kate 18.04.3 Potentially vulnerable Unspecified -
Fedora 29
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 30
updates
kate 19.08.3 Potentially vulnerable Unspecified -
Fedora 30
release
kate 18.12.2 Potentially vulnerable Unspecified -
Fedora 30
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 31
updates
kate 19.12.1 Potentially vulnerable Unspecified -
Fedora 31
release
kate 19.08.0 Potentially vulnerable Unspecified -
Fedora 31
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 32
updates
kate 20.08.3 Potentially vulnerable Unspecified -
Fedora 32
release
kate 19.12.2 Potentially vulnerable Unspecified -
Fedora 32
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 33
updates
kate 20.12.2 Potentially vulnerable Unspecified -
Fedora 33
release
kate 20.08.1 Potentially vulnerable Unspecified -
Fedora 33
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 34
updates
kate 21.08.3 Potentially vulnerable Unspecified -
Fedora 34
release
kate 20.12.2 Potentially vulnerable Unspecified -
Fedora 34
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 35
updates
kate 21.12.2 Unspecified -
Fedora 35
release
kate 21.08.0 Potentially vulnerable Unspecified -
Fedora 35
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 36
updates
kate 22.12.0 Unspecified -
Fedora 36
release
kate 21.12.2 Unspecified -
Fedora 36
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora 37
updates
kate 22.12.3 Unspecified -
Fedora 37
release
kate 22.08.2 Unspecified -
Fedora 37
release
kate4 4.14.3 Potentially vulnerable Unspecified -
Fedora Rawhide
development
kate 22.12.3 Unspecified -
Fedora Rawhide
development
kate4 4.14.3 Potentially vulnerable Unspecified -
FreeBSD Ports editors/kate 22.12.3 editors kde@freebsd.org
Gentoo kde-apps/kate 22.12.3 kde-apps kde@gentoo.org
Gentoo kde-apps/kate 22.08.3 kde-apps kde@gentoo.org
GNU Guix kate 22.04.3 - -
GoboLinux Kate 4.12.0 Potentially vulnerable - -
HaikuPorts master kde-base/kate 22.04.0 kde-base -
Kali Linux Rolling
main
kate 22.12.3 editors debian-qt-kde@lists.debian.org, coucouf@debian.org
KaOS
apps
kate 22.12.3 - demm@kaosx.us
KDE neon Testing
main
kate 22.12.3+p22.04+tstable+git20230327.0018 - neon@kde.org, maxy@debian.org, modax@debian.org, sune@debian.org
KDE neon Unstable
main
kate 22.12.2+p22.04+tunstable+git20230227.0023 - neon@kde.org, maxy@debian.org, modax@debian.org, sune@debian.org
KDE neon Unstable
main
kate 22.12.2+p22.04+tunstable+git20230226.1042 - neon@kde.org, maxy@debian.org, modax@debian.org, sune@debian.org
KDE neon User
main
kate 22.08.1 - neon@kde.org, maxy@debian.org, modax@debian.org, sune@debian.org
KDE neon User
main
kate 22.08.0 - neon@kde.org, maxy@debian.org, modax@debian.org, sune@debian.org
KDE neon User
main
kate 22.04.3 - neon@kde.org, maxy@debian.org, modax@debian.org, sune@debian.org
KDE neon User
main
kate 22.04.2 - neon@kde.org, maxy@debian.org, modax@debian.org, sune@debian.org
KDE neon User LTS
main
kate 21.04.2 Potentially vulnerable - neon@kde.org, maxy@debian.org, modax@debian.org, sune@debian.org
LiGurOS stable kde-apps/kate 22.12.1 kde-apps kde@gentoo.org
LiGurOS stable kde-apps/kate 22.08.3 kde-apps kde@gentoo.org
LiGurOS develop kde-apps/kate 22.12.3 kde-apps kde@gentoo.org
LiGurOS develop kde-apps/kate 22.08.3 kde-apps kde@gentoo.org
Linux Mint 17.1
import
kate 4.14.2 Potentially vulnerable kde kubuntu-devel@lists.ubuntu.com, maxy@debian.org, modax@debian.org, sune@debian.org
Linux Mint 17.2
import
kate 4.14.2 Potentially vulnerable kde kubuntu-devel@lists.ubuntu.com, maxy@debian.org, modax@debian.org, sune@debian.org
Linux Mint 17.3
import
kate 4.14.2 Potentially vulnerable kde kubuntu-devel@lists.ubuntu.com, maxy@debian.org, modax@debian.org, sune@debian.org
MacPorts kate 4.14.3 Potentially vulnerable kde nomaintainer@macports.org
Mageia 7
core/release
kate 19.04.0 Potentially vulnerable Editors -
Mageia 8
core/release
kate 20.12.0 Potentially vulnerable Editors -
Mageia Cauldron
core/release
kate 22.12.3 Editors -
Manjaro Stable
extra
kate 22.12.2 - -
Manjaro Testing
extra
kate 22.12.3 - -
Manjaro Unstable
extra
kate 22.12.3 - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-kate 22.12.3 mingw-w64-x86_64-kde-applications -
MSYS2 mingw
i686
mingw-w64-i686-kate 22.12.3 mingw-w64-i686-kde-applications -
nixpkgs stable 21.11 kate 21.12.2 libsForQt514 ttuegel@mailbox.org
nixpkgs stable 21.11 kate 21.12.2 libsForQt5 ttuegel@mailbox.org
nixpkgs stable 21.11 kate 21.12.2 libsForQt512 ttuegel@mailbox.org
nixpkgs stable 22.05 kate 22.04.1 libsForQt514 ttuegel@mailbox.org
nixpkgs stable 22.05 kate 22.04.1 libsForQt5 ttuegel@mailbox.org
nixpkgs stable 22.05 kate 22.04.1 libsForQt512 ttuegel@mailbox.org
nixpkgs stable 22.11 kate 22.08.3 libsForQt512 ttuegel@mailbox.org
nixpkgs stable 22.11 kate 22.08.3 libsForQt514 ttuegel@mailbox.org
nixpkgs stable 22.11 kate 22.08.3 libsForQt5 ttuegel@mailbox.org
nixpkgs unstable kate 22.12.3 libsForQt5 ttuegel@mailbox.org
OpenBSD Ports x11/kde-applications/kate 22.12.3 editors rsadowski@openbsd.org
openmamba
devel
kate 22.12.3 Graphical Desktop/Applications/Development silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
kate 19.04.2 Potentially vulnerable Graphical desktop/KDE bero@lindev.ch
OpenMandriva 4.0
main/release
kate 19.04.1 Potentially vulnerable Graphical desktop/KDE bero@lindev.ch
OpenMandriva 4.1
main/release
kate 19.12.1 Potentially vulnerable Graphical desktop/KDE bero@lindev.ch
OpenMandriva 4.2
main/release
kate 20.12.1 Potentially vulnerable Graphical desktop/KDE bero@lindev.ch
OpenMandriva 4.3
main/release
kate 21.12.2 Graphical desktop/KDE bero@lindev.ch
OpenMandriva 4.3
main/release
kate 21.12.1 Potentially vulnerable Graphical desktop/KDE bero@lindev.ch
OpenMandriva Rolling
main/release
kate 22.12.3 Graphical desktop/KDE bero@lindev.ch
OpenMandriva Cooker
main/release
kate 22.12.3 Graphical desktop/KDE bero@lindev.ch
openSUSE Leap 42.3
main/oss
kate 17.04.2 Potentially vulnerable Productivity/Editors/Other -
openSUSE Leap 15.0
main/oss
kate 17.12.3 Potentially vulnerable Productivity/Text/Editors -
openSUSE Leap 15.1
main/oss
kate 18.12.3 Potentially vulnerable Productivity/Text/Editors -
openSUSE Leap 15.2
main/oss
kate 20.04.2 Potentially vulnerable Productivity/Text/Editors -
openSUSE Leap 15.3
main/oss
kate 20.04.2 Potentially vulnerable Productivity/Text/Editors -
openSUSE Leap 15.4
main/oss
kate 21.12.3 Productivity/Text/Editors -
openSUSE Leap 15.5
main/oss
kate 22.12.3 Unspecified -
openSUSE Tumbleweed
src-oss
kate 22.12.3 Unspecified -
Parabola
extra
kate 22.12.3 - -
Parabola
pcr
kate-root 19.04.2 Potentially vulnerable - -
Parabola
pcr
kwrite-root 19.04.2 Potentially vulnerable - -
Pardus 17
main
kate 16.08.3 Potentially vulnerable editors debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Pardus 17
main
kate4 4.14.3 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Pardus 19
main
kate 18.08.0 Potentially vulnerable editors debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Pardus 19
main
kate4 4.14.3 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Pardus 21
main
kate 20.12.2 Potentially vulnerable editors debian-qt-kde@lists.debian.org, norbert@preining.info, sune@debian.org
Parrot
parrot/main
kate 20.12.2 Potentially vulnerable editors debian-qt-kde@lists.debian.org, norbert@preining.info, sune@debian.org
Parrot
parrot-updates/main
kate 20.12.2 Potentially vulnerable editors debian-qt-kde@lists.debian.org, norbert@preining.info, sune@debian.org
PCLinuxOS kate 22.12.3 Graphical desktop/KDE5 -
Pisi Linux
main
kate 22.12.3 app:gui admin@pisilinux.org
pkgsrc current editors/kate 22.08.1 editors markd@netbsd.org
PLD Linux ka5-kate 22.12.2 - -
PureOS Amber kate 18.08.0 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
PureOS Amber kate4 4.14.3 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
PureOS landing kate 20.12.2 Potentially vulnerable misc debian-qt-kde@lists.debian.org, norbert@preining.info, sune@debian.org
Raspbian Oldstable
main
kate 18.08.0 Potentially vulnerable editors debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Raspbian Oldstable
main
kate4 4.14.3 Potentially vulnerable misc debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Raspbian Stable
main
kate 20.12.2 Potentially vulnerable editors debian-qt-kde@lists.debian.org, norbert@preining.info, sune@debian.org
Raspbian Testing
main
kate 22.12.3 editors debian-qt-kde@lists.debian.org, coucouf@debian.org
Rosa 2014.1
main/updates
plasma5-kate 16.04.3 Potentially vulnerable - -
Rosa 2014.1
main/updates
kate 4.14.3 Potentially vulnerable - -
Rosa 2014.1
main/release
kate 4.13.3 Potentially vulnerable - -
Rosa 2016.1
main/updates
plasma5-kate 18.12.1 Potentially vulnerable - -
Rosa 2016.1
main/release
plasma5-kate 16.12.3 Potentially vulnerable - -
Rosa 2016.1
main/release
kate 4.14.3 Potentially vulnerable - -
Rosa 2016.1
main/updates
kate 4.14.3 Potentially vulnerable - -
Rosa 2021.1
main/release
plasma5-kate 21.12.3 Graphical desktop/KDE m.novosyolov@rosalinux.ru
Rosa Server 7.3
base/release
kate 4.10.5 Potentially vulnerable Unspecified alex2048@mail.ru
Rosa Server 7.5
base/release
kate 4.10.5 Potentially vulnerable Unspecified alex2048@mail.ru
Rosa Server 7.5
base/release
kate 4.10.5 Potentially vulnerable Unspecified alex2048@mail.ru
Scientific Linux 7.x kate 4.10.5 Potentially vulnerable Unspecified -
Scientific Linux 7.x kate 4.10.5 Potentially vulnerable Unspecified -
Scientific Linux 7.x kate 4.10.5 Potentially vulnerable Unspecified -
Scientific Linux 7.x kate 4.10.5 Potentially vulnerable Unspecified -
Scoop
extras
kate 22.08.0 - -
Slackware 14.2
slackware
kate 4.14.3 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
kate 21.12.1 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
kate 22.12.3 - volkerdi@slackware.com
Slackware64 14.2
slackware64
kate 4.14.3 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
kate 21.12.1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
kate 22.12.3 - volkerdi@slackware.com
Slackwarearm 14.2
slackware
kate 4.14.3 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
kate 21.12.1 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking kate 4.14.3 Potentially vulnerable x-window psychomaniak@xakep.ru
T2 SDE kate 22.12.3 extra/windowmanager extra/office extra/desktop/kde rene@t2-project.org
Trisquel 6.0
toutatis-updates/main
kate 4.8.5 Potentially vulnerable kde kubuntu-devel@lists.ubuntu.com, info@eshat.de, panfaust@gmail.com
Trisquel 6.0
toutatis/main
kate 4.8.2 Potentially vulnerable kde kubuntu-devel@lists.ubuntu.com, info@eshat.de, panfaust@gmail.com
Trisquel 7.0
belenos-updates/main
kate 4.13.3 Potentially vulnerable universe/kde kubuntu-devel@lists.ubuntu.com, modax@debian.org, sune@debian.org
Trisquel 7.0
belenos/main
kate 4.13.0 Potentially vulnerable universe/kde kubuntu-devel@lists.ubuntu.com, modax@debian.org, sune@debian.org
Trisquel 8.0
flidas/main
kate 15.12.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Trisquel 8.0
flidas/main
kate4 4.14.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Trisquel 9.0
etiona/main
kate 17.12.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Trisquel 9.0
etiona/main
kate4 4.14.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Trisquel 10.0
nabia/main
kate 19.12.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Ubuntu 14.04
trusty-updates/universe
kate 4.13.3 Potentially vulnerable universe/kde kubuntu-devel@lists.ubuntu.com, modax@debian.org, sune@debian.org
Ubuntu 14.04
trusty/universe
kate 4.13.0 Potentially vulnerable universe/kde kubuntu-devel@lists.ubuntu.com, modax@debian.org, sune@debian.org
Ubuntu 16.04
xenial/universe
kate 15.12.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Ubuntu 16.04
xenial/universe
kate4 4.14.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Ubuntu 18.04
bionic/universe
kate 17.12.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Ubuntu 18.04
bionic/universe
kate4 4.14.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Ubuntu 20.04
focal/universe
kate 19.12.3 Potentially vulnerable universe/kde debian-qt-kde@lists.debian.org, maxy@debian.org, modax@debian.org, sune@debian.org
Ubuntu 22.04
jammy/universe
kate 21.12.3 universe/kde kubuntu-devel@lists.ubuntu.com, norbert@preining.info, sune@debian.org
Ubuntu 22.10
kinetic/universe
kate 22.08.2 universe/kde kubuntu-devel@lists.ubuntu.com, coucouf@debian.org
Ubuntu 23.04
lunar/universe
kate 22.12.3 universe/kde kubuntu-devel@lists.ubuntu.com, coucouf@debian.org
Void Linux x86_64
x86_64
kate5 22.12.1 - me@johnnynator.dev
Void Linux x86_64
x86_64
kwrite 22.12.1 - me@johnnynator.dev
Void Linux x86_64
x86_64
libkate 22.12.1 - me@johnnynator.dev
Wikidata Kate 22.12.0 - -
Wikidata Kate 22.07.90 - -
winget Kate 22.12.3 crossplatform -
winget Kate 22.12.2 crossplatform -
winget Kate 22.12.1 crossplatform -
winget Kate 22.12.0 crossplatform -
winget Kate 22.08.3 crossplatform -
winget Kate 22.08.3 - -
winget Kate 22.04.0 - -
winget Kate 22.04.0 crossplatform -