Versions Packages Information History CVEs Related Badges Report

Versions for file

392 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
libmagic 5.39 - adelie@aerdan.vulpine.house
Adélie Linux current
system
file 5.39 - adelie@aerdan.vulpine.house
Adélie Linux current
system
file-dev 5.39 - adelie@aerdan.vulpine.house
Adélie Linux current
system
file-dbg 5.39 - adelie@aerdan.vulpine.house
Adélie Linux current
system
file-doc 5.39 - adelie@aerdan.vulpine.house
AIX Open Source Packages file 5.38 - -
AIX Open Source Packages file 5.37 Potentially vulnerable - -
AIX Open Source Packages file 5.36 Potentially vulnerable - -
AIX Open Source Packages file 5.35 Potentially vulnerable - -
AIX Open Source Packages file 5.34 Potentially vulnerable - -
AIX Open Source Packages file 5.33 Potentially vulnerable - -
AIX Open Source Packages file 5.32 Potentially vulnerable - -
AIX Open Source Packages file 5.31 Potentially vulnerable - -
AIX Open Source Packages file 5.30 Potentially vulnerable - -
AIX Open Source Packages file 5.29 Potentially vulnerable - -
AIX Open Source Packages file 5.29 Potentially vulnerable - -
AIX Open Source Packages file 5.28 Potentially vulnerable - -
AIX Open Source Packages file 5.27 Potentially vulnerable - -
AIX Open Source Packages file 5.25 Potentially vulnerable - -
AIX Open Source Packages file 5.24 Potentially vulnerable - -
AIX Open Source Packages file 5.23 Potentially vulnerable - -
AIX Open Source Packages file 5.22 Potentially vulnerable - -
AIX Open Source Packages file 5.21 Potentially vulnerable - -
AIX Open Source Packages file 5.20 Potentially vulnerable - -
AIX Open Source Packages file 5.19 Potentially vulnerable - -
AIX Open Source Packages file 5.18 Potentially vulnerable - -
AIX Open Source Packages file 5.17 Potentially vulnerable - -
AIX Open Source Packages file 5.16 Potentially vulnerable - -
AIX Open Source Packages file 5.15 Potentially vulnerable - -
AIX Open Source Packages file 5.14 Potentially vulnerable - -
AIX Open Source Packages file 5.14 Potentially vulnerable - -
AIX Open Source Packages file 5.13 Potentially vulnerable - -
AIX Open Source Packages file 5.13 Potentially vulnerable - -
AIX Open Source Packages file 5.12 Potentially vulnerable - -
AIX Open Source Packages file 5.12 Potentially vulnerable - -
AIX Open Source Packages file 5.11 Potentially vulnerable - -
AIX Open Source Packages file 5.11 Potentially vulnerable - -
AIX Open Source Packages file 5.10 Potentially vulnerable - -
AIX Open Source Packages file 5.10 Potentially vulnerable - -
AIX Open Source Packages file 5.09 Potentially vulnerable - -
AIX Open Source Packages file 5.09 Potentially vulnerable - -
AIX Open Source Packages file 5.08 Potentially vulnerable - -
AIX Open Source Packages file 5.08 Potentially vulnerable - -
AIX Open Source Packages file 5.07 Potentially vulnerable - -
AIX Open Source Packages file 5.07 Potentially vulnerable - -
AIX Open Source Packages file 5.06 Potentially vulnerable - -
AIX Open Source Packages file 5.06 Potentially vulnerable - -
AIX Open Source Packages file 5.05 Potentially vulnerable - -
AIX Open Source Packages file 5.05 Potentially vulnerable - -
AIX Open Source Packages file 5.04 Potentially vulnerable - -
AIX Open Source Packages file 5.04 Potentially vulnerable - -
AIX Open Source Packages file 5.03 Potentially vulnerable - -
AIX Toolbox file 5.38 Applications/File -
AIX Toolbox file 5.36 Potentially vulnerable Applications/File -
AIX Toolbox file 5.32 Potentially vulnerable Applications/File -
AIX Toolbox file 5.32 Potentially vulnerable Applications/File -
AIX Toolbox file 5.29 Potentially vulnerable Applications/File -
AlmaLinux 8
BaseOS
file 5.33 Potentially vulnerable Applications/File packager@almalinux.org
Alpine Linux 3.8
main
file-doc 5.32 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
libmagic 5.32 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
file 5.32 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
file-dev 5.32 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
libmagic 5.36 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
file 5.36 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
file-dev 5.36 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
file-doc 5.36 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
file 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
file-doc 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
libmagic 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
file-dev 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
file 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
file-dev 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
libmagic 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
file-doc 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
file-doc 5.38 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
libmagic 5.38 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
file 5.38 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
file-dev 5.38 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
file-dev 5.39 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
file-doc 5.39 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
libmagic 5.39 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
file 5.39 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
file-dev 5.40 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
file-doc 5.40 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
libmagic 5.40 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
file 5.40 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
file-doc 5.41 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
file 5.41 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
file-dev 5.41 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
libmagic 5.41 - ncopa@alpinelinux.org
Alpine Linux Edge
main
file-doc 5.41 - ncopa@alpinelinux.org
Alpine Linux Edge
main
file-dev 5.41 - ncopa@alpinelinux.org
Alpine Linux Edge
main
file 5.41 - ncopa@alpinelinux.org
Alpine Linux Edge
main
libmagic 5.41 - ncopa@alpinelinux.org
ALT Linux p9 file 4.26 Potentially vulnerable File tools ldv@altlinux.org
ALT Linux p10 file 4.26 Potentially vulnerable File tools glebfm@altlinux.org
ALT Sisyphus file 5.41 File tools vt@altlinux.org
Amazon Linux 1
updates
file 5.37 Potentially vulnerable Unspecified -
Amazon Linux 1
updates
file 5.37 Potentially vulnerable Unspecified -
Amazon Linux 1
updates
file 5.34 Potentially vulnerable Unspecified -
Amazon Linux 1
main
file 5.30 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
AOSC file 5.41 utils fallback-mnt-aosc@repology
Apertis v2020
v2020/target
file 5.35 Potentially vulnerable main debian.axhn@manchmal.in-ulm.de
Apertis v2021
v2021/target
file 5.35 Potentially vulnerable main debian.axhn@manchmal.in-ulm.de
Apertis v2022
v2022/target
file 5.39 main debian.axhn@manchmal.in-ulm.de
Apertis v2023 Development
v2023dev1/target
file 5.39 main debian.axhn@manchmal.in-ulm.de
AppGet File 5.3.0 Potentially vulnerable - -
Arch
core
file 5.41 - -
Arch
community
python-magic 5.40 - -
Arch Linux 32 i486
core
file 5.41 - -
Arch Linux 32 i486
community
python-magic 5.40 - -
Arch Linux 32 i686
core
file 5.41 - -
Arch Linux 32 i686
community
python-magic 5.40 - -
Arch Linux 32 pentium4
core
file 5.41 - -
Arch Linux 32 pentium4
community
python-magic 5.40 - -
Arch Linux ARM aarch64
core
file 5.41 - -
Arch Linux ARM aarch64
community
python-magic 5.40 - -
Arch Linux ARM armv7h
core
file 5.41 - -
Arch Linux ARM armv7h
community
python-magic 5.40 - -
ArchPOWER powerpc file 5.41 - -
ArchPOWER powerpc64le file 5.41 - -
ArchPOWER riscv64 file 5.41 - -
AUR file-git 5.21.r4.g4f2c3a6 - eworm@aur
Artix
system
file 5.41 - -
Artix
galaxy
python-magic 5.40 - -
Astra Orel Stable
main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Ataraxia GNU/Linux file 5.40 base nagakamira@gmail.com
BlackArch python2-magic 5.37 Potentially vulnerable - -
Carbs Linux
extra
file 5.41 - cem@carbslinux.org
CentOS 6
os
file 5.04 Potentially vulnerable Applications/File -
CentOS 7
os
file 5.11 Potentially vulnerable Applications/File -
CentOS 8
BaseOS
file 5.33 Potentially vulnerable Applications/File bugs@centos.org
CentOS Stream 8
BaseOS
file 5.33 Potentially vulnerable Applications/File bugs@centos.org
CentOS Stream 8
BaseOS
file 5.33 Potentially vulnerable Applications/File bugs@centos.org
CentOS Stream 8
BaseOS
file 5.33 Potentially vulnerable Applications/File bugs@centos.org
CentOS Stream 8
BaseOS
file 5.33 Potentially vulnerable Applications/File bugs@centos.org
CentOS Stream 8
BaseOS
file 5.33 Potentially vulnerable Applications/File bugs@centos.org
CentOS Stream 9
BaseOS
file 5.39 Unspecified builder@centos.org
Chocolatey file 5.41 - -
CRUX 3.4
core
file 5.37 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
core
file 5.39 - core-ports@crux.nu
CRUX 3.6
core
file 5.41 - core-ports@crux.nu
Cygwin python3-magic 5.41 Python corinna.vinschen@cygwin
Cygwin file 5.41 Base corinna.vinschen@cygwin
Cygwin file-debuginfo 5.41 Debug corinna.vinschen@cygwin
Cygwin file-devel 5.41 Devel corinna.vinschen@cygwin
Cygwin python2-magic 5.41 Python corinna.vinschen@cygwin
Debian 8
jessie/main
file 5.22+15 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Debian 9
stretch/main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Debian 10
buster/main
file 5.35 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Debian 11
bullseye/main
file 5.39 utils debian.axhn@manchmal.in-ulm.de
Debian 12
bookworm/main
file 5.41 utils debian.axhn@manchmal.in-ulm.de
Debian Unstable
sid/main
file 5.41 utils debian.axhn@manchmal.in-ulm.de
Deepin
main
file 5.35.1.1 Potentially vulnerable - debian.axhn@manchmal.in-ulm.de
Devuan 1.0
jessie/main
file 5.22+15 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Devuan 2.0
ascii/main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Devuan 3.0
beowulf/main
file 5.35 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Devuan 4.0
chimaera/main
file 5.39 utils debian.axhn@manchmal.in-ulm.de
Devuan Unstable
unstable/main
file 5.41 utils debian.axhn@manchmal.in-ulm.de
distri file 5.38 - -
DistroWatch.com file 5.41 - -
DPorts devel/py-magic 5.40 devel lwhsu@freebsd.org
DPorts sysutils/file 5.39 sysutils jharris@widomaker.com
Entware
armv5sf-k3.2
libmagic 5.41 libs markoratkaj@gmail.com
Entware
armv7sf-k2.6
file 5.41 utils markoratkaj@gmail.com
Entware
armv7sf-k2.6
libmagic 5.41 libs markoratkaj@gmail.com
Entware
armv7sf-k3.2
file 5.41 utils markoratkaj@gmail.com
Entware
armv7sf-k3.2
libmagic 5.41 libs markoratkaj@gmail.com
Entware
aarch64-k3.10
file 5.41 utils markoratkaj@gmail.com
Entware
aarch64-k3.10
libmagic 5.41 libs markoratkaj@gmail.com
Entware
armv5sf-k3.2
file 5.41 utils markoratkaj@gmail.com
Entware
mipselsf-k3.4
file 5.41 utils markoratkaj@gmail.com
Entware
mipselsf-k3.4
libmagic 5.41 libs markoratkaj@gmail.com
Entware
mipssf-k3.4
file 5.41 utils markoratkaj@gmail.com
Entware
mipssf-k3.4
libmagic 5.41 libs markoratkaj@gmail.com
Entware
x64-k3.2
file 5.41 utils markoratkaj@gmail.com
Entware
x64-k3.2
libmagic 5.41 libs markoratkaj@gmail.com
EuroLinux 8
baseos
file 5.33 Potentially vulnerable Applications/File -
EuroLinux 8
baseos
file 5.33 Potentially vulnerable Applications/File -
EuroLinux 8
baseos
file 5.33 Potentially vulnerable Applications/File -
EuroLinux 8
baseos
file 5.33 Potentially vulnerable Applications/File -
Exherbo
arbor
sys-apps/file 5.41 sys-apps fallback-mnt-exherbo@repology
Fedora 26
release
file 5.30 Potentially vulnerable Applications/File -
Fedora 26
updates
file 5.30 Potentially vulnerable Applications/File -
Fedora 27
release
file 5.31 Potentially vulnerable Applications/File -
Fedora 27
updates
file 5.31 Potentially vulnerable Applications/File -
Fedora 28
updates
file 5.33 Potentially vulnerable Applications/File -
Fedora 28
release
file 5.32 Potentially vulnerable Applications/File -
Fedora 29
release
file 5.34 Potentially vulnerable Unspecified -
Fedora 29
updates
file 5.34 Potentially vulnerable Unspecified -
Fedora 30
release
file 5.36 Potentially vulnerable Unspecified -
Fedora 30
updates
file 5.36 Potentially vulnerable Unspecified -
Fedora 31
release
file 5.37 Potentially vulnerable Unspecified -
Fedora 31
updates
file 5.37 Potentially vulnerable Unspecified -
Fedora 32
updates
file 5.38 Unspecified -
Fedora 32
release
file 5.38 Unspecified -
Fedora 33
release
file 5.39 Unspecified -
Fedora 34
updates
file 5.39 Unspecified -
Fedora 34
release
file 5.39 Unspecified -
Fedora 35
release
file 5.40 Unspecified -
Fedora 36
development
file 5.41 Unspecified -
Fedora Rawhide
development
file 5.41 Unspecified -
FreeBSD Ports devel/py-magic 5.41 devel lwhsu@freebsd.org
FreeBSD Ports sysutils/file 5.39 sysutils jharris@widomaker.com
Funtoo 1.4
core-kit
sys-apps/file 5.41 sys-apps fallback-mnt-funtoo@repology
Gentoo sys-apps/file 9999 sys-apps base-system@gentoo.org
Gentoo sys-apps/file 5.41 sys-apps base-system@gentoo.org
Gentoo sys-apps/file 5.41 sys-apps base-system@gentoo.org
GNU Guix file 5.41 - -
GNU Guix file 5.39 - -
GoboLinux File 5.34 Potentially vulnerable - -
HaikuPorts master sys-apps/file 5.41 sys-apps -
Homebrew libmagic 5.41 - -
HP-UX 11.31
ia64_64
file 5.41 - -
HP-UX 11.31
hppa_32
file 5.39 - -
HP-UX 11.31
ia64_64
file 5.39 - -
HP-UX 11.31
ia64_32
file 5.31 Potentially vulnerable - -
HP-UX 11.31
hppa_32
file 5.31 Potentially vulnerable - -
HP-UX 11.31
hppa_32
file 5.16 Potentially vulnerable - -
IBM i file 5.32 Potentially vulnerable Unspecified -
Kali Linux Rolling
main
file 5.41 utils debian.axhn@manchmal.in-ulm.de
KaOS
core
file 5.41 - demm@kaosx.us
LiGurOS stable sys-apps/file 9999 sys-apps base-system@gentoo.org
LiGurOS stable sys-apps/file 5.41 sys-apps base-system@gentoo.org
LiGurOS develop sys-apps/file 9999 sys-apps base-system@gentoo.org
LiGurOS develop sys-apps/file 5.41 sys-apps base-system@gentoo.org
LiGurOS develop sys-apps/file 5.41 sys-apps base-system@gentoo.org
MacPorts file 5.41 sysutils ryandesign@macports, ryandesign@github
MacPorts libmagic 5.41 sysutils ryandesign@macports, ryandesign@github
Maemo Fremantle file 4.12 Potentially vulnerable - piefel@debian.org
Mageia 7
core/updates
file 5.37 Potentially vulnerable File tools -
Mageia 7
core/updates
file 5.37 Potentially vulnerable File tools -
Mageia 7
core/release
file 5.36 Potentially vulnerable File tools -
Mageia 8
core/release
file 5.39 File tools -
Mageia Cauldron
core/release
file 5.41 File tools -
Manjaro Stable
core
file 5.41 - -
Manjaro Stable
community
python-magic 5.40 - -
Manjaro Testing
core
file 5.41 - -
Manjaro Testing
community
python-magic 5.40 - -
Manjaro Unstable
core
file 5.41 - -
Manjaro Unstable
community
python-magic 5.40 - -
MidnightBSD mports devel/py-magic 5.39 devel -
MSYS2 mingw
x86_64
mingw-w64-x86_64-file 5.39 - -
MSYS2 mingw
i686
mingw-w64-i686-file 5.39 - -
MSYS2 msys2
x86_64
file 5.41 - -
MSYS2 msys2
i686
file 5.40 base-devel -
nixpkgs stable 21.05 file 5.39 - fallback-mnt-nix@repology
nixpkgs stable 21.11 file 5.41 - me@doronbehar.com
nixpkgs unstable file 5.41 - me@doronbehar.com
OpenBSD Ports devel/libmagic 5.41 sysutils ports@openbsd.org
openEuler 20.03
source
file 5.38 Unspecified -
OpenIndiana packages
hipster
file 5.40 System/Libraries -
OpenIndiana packages
hipster
file 5.40 System/Text Tools -
openmamba
devel
file 5.41 Applications/File silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
file 5.37 Potentially vulnerable File tools bero@lindev.ch
OpenMandriva 4.1
main/release
file 5.38 File tools nobodydead@gmail.com
OpenMandriva 4.2
main/release
file 5.39 File tools bero@lindev.ch
OpenMandriva Rolling
main/release
file 5.41 File tools tpgxyz@gmail.com
OpenMandriva Cooker
main/release
file 5.41 File tools bero+massbuild@lindev.ch
OpenPKG file 5.41 Filesystem -
openSUSE Leap 42.3
updates/oss
file 5.22 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 42.3
updates/oss
file 5.22 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 42.3
updates/oss
file 5.22 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 42.3
updates/oss
python-magic 5.22 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 42.3
updates/oss
python-magic 5.22 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 42.3
updates/oss
python-magic 5.22 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 42.3
main/oss
file 5.19 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 42.3
main/oss
python-magic 5.19 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.0
main/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.0
main/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.0
updates/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.0
updates/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.1
updates/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.1
updates/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.1
updates/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.1
updates/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.1
main/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.1
main/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.2
main/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.2
main/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.2
updates/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.2
updates/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.2
updates/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.2
updates/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.3
main/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.3
main/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.4
main/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.4
main/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Tumbleweed
src-oss
file 5.41 Productivity/File utilities -
openSUSE Tumbleweed
src-oss
python-magic 5.41 Development/Languages/Python -
OpenWrt 17.01 x86_64
packages
file 5.25 Potentially vulnerable utils luka@openwrt.org
OpenWrt 17.01 x86_64
packages
libmagic 5.25 Potentially vulnerable libs luka@openwrt.org
OpenWrt 18.06 x86_64
packages
file 5.25 Potentially vulnerable utils marko.ratkaj@sartura.hr
OpenWrt 18.06 x86_64
packages
libmagic 5.25 Potentially vulnerable libs marko.ratkaj@sartura.hr
OpenWrt 19.07 x86_64
packages
file 5.38 utils marko.ratkaj@sartura.hr
OpenWrt 19.07 x86_64
packages
libmagic 5.38 libs marko.ratkaj@sartura.hr
OpenWrt 21.02 x86_64
packages
file 5.39 utils marko.ratkaj@sartura.hr
OpenWrt 21.02 x86_64
packages
libmagic 5.39 libs marko.ratkaj@sartura.hr
Parabola
core
file 5.41 - -
Parabola
community
python-magic 5.40 - -
Parabola Testing
libre-testing
file-debug 5.38 - -
Pardus 17
main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Pardus 17
updates/main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Pardus 19
main
file 5.35 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Pardus 19
updates/main
file 5.35 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Pardus 21
main
file 5.39 utils debian.axhn@manchmal.in-ulm.de
Parrot
parrot/main
file 5.39 utils debian.axhn@manchmal.in-ulm.de
Parrot
parrot-updates/main
file 5.39 utils debian.axhn@manchmal.in-ulm.de
PCLinuxOS file 5.38 File tools -
Pisi Linux
core
file 5.38 app:console admins@pisilinux.org
pkgsrc current sysutils/file 5.40 sysutils pkgsrc-users@netbsd.org
PLD Linux file 5.41 - -
PureOS Amber file 5.35 Potentially vulnerable misc debian.axhn@manchmal.in-ulm.de
PureOS landing file 5.39 misc debian.axhn@manchmal.in-ulm.de
Raspbian Oldstable
main
file 5.35 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Raspbian Stable
main
file 5.39 utils debian.axhn@manchmal.in-ulm.de
Raspbian Testing
main
file 5.41 utils debian.axhn@manchmal.in-ulm.de
Ravenports file 5.41 sysutils fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
file 5.33 Potentially vulnerable Applications/File infrastructure@rockylinux.org
Rosa 2014.1
main/updates
file 5.28 Potentially vulnerable - -
Rosa 2014.1
main/release
file 5.19 Potentially vulnerable - -
Rosa 2016.1
main/updates
file 5.31 Potentially vulnerable - -
Rosa 2016.1
main/release
file 5.28 Potentially vulnerable - -
Rosa 2019.1
main/release
file 5.40 File tools alexander@mezon.ru
Rosa Server 6.9
base/release
file 5.04 Potentially vulnerable Applications/File andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
file 5.04 Potentially vulnerable Applications/File andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
file 5.11 Potentially vulnerable Applications/File alex2048@mail.ru
Rosa Server 7.5
base/release
file 5.11 Potentially vulnerable Applications/File alex2048@mail.ru
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scoop
main
file 5.38 - -
Slackware 14.2
patches
file 5.36 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
file 5.25 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
file 5.41 - volkerdi@slackware.com
Slackware current
slackware
file 5.41 - volkerdi@slackware.com
Slackware64 14.2
patches
file 5.36 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
file 5.25 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
file 5.41 - volkerdi@slackware.com
Slackware64 current
slackware64
file 5.41 - volkerdi@slackware.com
Slackwarearm 14.2
patches
file 5.36 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
file 5.25 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
file 5.41 - volkerdi@slackware.com
SliTaz Cooking file 5.41 system-tools erjo@slitaz.org
SliTaz Cooking libmagic 5.41 system-tools erjo@slitaz.org
SliTaz Cooking libmagic-dev 5.41 development erjo@slitaz.org
SliTaz Cooking python-magic 5.41 development erjo@slitaz.org
SliTaz Next file 5.34 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Next libmagic 5.34 Potentially vulnerable libs devel@slitaz.org
SliTaz Next libmagic-dev 5.34 Potentially vulnerable development devel@slitaz.org
SliTaz Next python-magic 5.34 Potentially vulnerable development devel@slitaz.org
Solus file 5.41 system.base yakoyoku@gmail.com
Solus file-dbginfo 5.41 debug yakoyoku@gmail.com
Solus file-devel 5.41 system.devel yakoyoku@gmail.com
Spack file 5.40 - sethrj@spack
T2 SDE file 5.41 base/tool rene@t2-project.org
Termux file 5.41 - termux@github
Trisquel 6.0
toutatis-updates/main
file 5.09 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, fgrfgr@freenet.de
Trisquel 6.0
toutatis/main
file 5.09 Potentially vulnerable utils daniel.baumann@progress-technologies.net, fgrfgr@freenet.de
Trisquel 7.0
belenos/main
file 5.14 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos-updates/main
file 5.14 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas-updates/main
file 5.25 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
file 5.25 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona/main
file 5.32 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Trisquel 9.0
etiona-updates/main
file 5.32 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia/main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
UBI 8
baseos
file 5.33 Potentially vulnerable Applications/File -
Ubuntu 14.04
trusty/main
file 5.14 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
file 5.14 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/main
file 5.25 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial-updates/main
file 5.25 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/main
file 5.32 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Ubuntu 18.04
bionic-updates/main
file 5.32 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
Ubuntu 21.04
hirsute/main
file 5.39 utils debian.axhn@manchmal.in-ulm.de
Ubuntu 21.10
impish/main
file 5.39 utils debian.axhn@manchmal.in-ulm.de
Ubuntu 22.04
jammy/main
file 5.41 utils debian.axhn@manchmal.in-ulm.de
Vcpkg libmagic 5.40 - -
Void Linux x86_64
x86_64
file 5.41 - gottox@voidlinux.org
Void Linux x86_64
x86_64
file-devel 5.41 - gottox@voidlinux.org
Void Linux x86_64
x86_64
libmagic 5.41 - gottox@voidlinux.org
Wikidata file 5.41 - -
yiffOS Knot file 5.41 - evie@uwueviee.live