Versions Packages Information History CVEs Related Badges Report

Versions for file

335 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
file-dev 5.39 - adelie@aerdan.vulpine.house
Adélie Linux current
system
libmagic 5.39 - adelie@aerdan.vulpine.house
Adélie Linux current
system
file 5.39 - adelie@aerdan.vulpine.house
Adélie Linux current
system
file-dbg 5.39 - adelie@aerdan.vulpine.house
Adélie Linux current
system
file-doc 5.39 - adelie@aerdan.vulpine.house
AIX Open Source Packages file 5.37 Potentially vulnerable - -
AIX Open Source Packages file 5.36 Potentially vulnerable - -
AIX Open Source Packages file 5.35 Potentially vulnerable - -
AIX Open Source Packages file 5.34 Potentially vulnerable - -
AIX Open Source Packages file 5.33 Potentially vulnerable - -
AIX Open Source Packages file 5.32 Potentially vulnerable - -
AIX Open Source Packages file 5.31 Potentially vulnerable - -
AIX Open Source Packages file 5.30 Potentially vulnerable - -
AIX Open Source Packages file 5.29 Potentially vulnerable - -
AIX Open Source Packages file 5.29 Potentially vulnerable - -
AIX Open Source Packages file 5.28 Potentially vulnerable - -
AIX Open Source Packages file 5.27 Potentially vulnerable - -
AIX Open Source Packages file 5.25 Potentially vulnerable - -
AIX Open Source Packages file 5.24 Potentially vulnerable - -
AIX Open Source Packages file 5.23 Potentially vulnerable - -
AIX Open Source Packages file 5.22 Potentially vulnerable - -
AIX Open Source Packages file 5.21 Potentially vulnerable - -
AIX Open Source Packages file 5.20 Potentially vulnerable - -
AIX Open Source Packages file 5.19 Potentially vulnerable - -
AIX Open Source Packages file 5.18 Potentially vulnerable - -
AIX Open Source Packages file 5.17 Potentially vulnerable - -
AIX Open Source Packages file 5.16 Potentially vulnerable - -
AIX Open Source Packages file 5.15 Potentially vulnerable - -
AIX Open Source Packages file 5.14 Potentially vulnerable - -
AIX Open Source Packages file 5.14 Potentially vulnerable - -
AIX Open Source Packages file 5.13 Potentially vulnerable - -
AIX Open Source Packages file 5.13 Potentially vulnerable - -
AIX Open Source Packages file 5.12 Potentially vulnerable - -
AIX Open Source Packages file 5.12 Potentially vulnerable - -
AIX Open Source Packages file 5.11 Potentially vulnerable - -
AIX Open Source Packages file 5.11 Potentially vulnerable - -
AIX Open Source Packages file 5.10 Potentially vulnerable - -
AIX Open Source Packages file 5.10 Potentially vulnerable - -
AIX Open Source Packages file 5.09 Potentially vulnerable - -
AIX Open Source Packages file 5.09 Potentially vulnerable - -
AIX Open Source Packages file 5.08 Potentially vulnerable - -
AIX Open Source Packages file 5.08 Potentially vulnerable - -
AIX Open Source Packages file 5.07 Potentially vulnerable - -
AIX Open Source Packages file 5.07 Potentially vulnerable - -
AIX Open Source Packages file 5.06 Potentially vulnerable - -
AIX Open Source Packages file 5.06 Potentially vulnerable - -
AIX Open Source Packages file 5.05 Potentially vulnerable - -
AIX Open Source Packages file 5.05 Potentially vulnerable - -
AIX Open Source Packages file 5.04 Potentially vulnerable - -
AIX Open Source Packages file 5.04 Potentially vulnerable - -
AIX Open Source Packages file 5.03 Potentially vulnerable - -
Alpine Linux 3.8
main
file-doc 5.32 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
file-dev 5.32 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
libmagic 5.32 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
file 5.32 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
libmagic 5.36 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
file 5.36 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
file-dev 5.36 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
file-doc 5.36 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
libmagic 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
file 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
file-doc 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
file-dev 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
libmagic 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
file-doc 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
file 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
file-dev 5.37 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
file-doc 5.38 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
file-dev 5.38 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
libmagic 5.38 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
file 5.38 - ncopa@alpinelinux.org
Alpine Linux Edge
main
file-dev 5.39 - ncopa@alpinelinux.org
Alpine Linux Edge
main
file 5.39 - ncopa@alpinelinux.org
Alpine Linux Edge
main
libmagic 5.39 - ncopa@alpinelinux.org
Alpine Linux Edge
main
file-doc 5.39 - ncopa@alpinelinux.org
ALT Linux p9 file 4.26 Potentially vulnerable File tools ldv@altlinux.org
ALT Sisyphus file 4.26 Potentially vulnerable File tools ldv@altlinux.org
Amazon Linux 1
updates
file 5.37 Potentially vulnerable Unspecified -
Amazon Linux 1
updates
file 5.37 Potentially vulnerable Unspecified -
Amazon Linux 1
updates
file 5.34 Potentially vulnerable Unspecified -
Amazon Linux 1
main
file 5.30 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
Amazon Linux 2 file 5.11 Potentially vulnerable Applications/File -
AOSC file 5.38 utils fallback-mnt-aosc@repology
AppGet File 5.3.0 Potentially vulnerable - -
Arch
core
file 5.39 - -
Arch
community
python-magic 5.39 - -
AUR file-git 5.21.r4.g4f2c3a6 - eworm@aur
Astra Orel Stable
main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Astra Orel Current
main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Ataraxia Linux file 5.39 base nagakamira@gmail.com
BlackArch python2-magic 5.37 Potentially vulnerable - -
Calculate sys-apps/file 5.37 Potentially vulnerable sys-apps fallback-mnt-calculate@repology
CentOS 6
os
file 5.04 Potentially vulnerable Applications/File -
CentOS 7
os
file 5.11 Potentially vulnerable Applications/File -
CentOS 8
BaseOS
file 5.33 Potentially vulnerable Applications/File bugs@centos.org
Chakra
core
file 5.32 Potentially vulnerable - -
Chakra
desktop
python2-magic 5.32 Potentially vulnerable - -
Chakra
desktop
python3-magic 5.32 Potentially vulnerable - -
CRUX 3.4
core
file 5.37 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
core
file 5.39 - core-ports@crux.nu
Cygwin file 5.32 Potentially vulnerable Base corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Cygwin file-debuginfo 5.32 Potentially vulnerable Debug corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Cygwin file-devel 5.32 Potentially vulnerable Devel corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Cygwin python2-magic 5.32 Potentially vulnerable Python corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Cygwin python3-magic 5.32 Potentially vulnerable Python corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Debian Oldstable
oldstable/main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Debian Stable
stable/main
file 5.35 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Debian Testing
testing/main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
Debian Unstable
main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
Deepin
main
file 5.33 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Devuan 1.0 (Jessie)
jessie/main
file 5.22 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Devuan 2.0 (ASCII)
ascii/main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Devuan 3.0 (Beowulf)
beowulf/main
file 5.35 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Devuan 4.0 (Chimaera)
chimaera/main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
Devuan Unstable
unstable/main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
distri file 5.38 - -
DistroWatch.com file 5.39 - -
DPorts devel/py-magic 5.38 devel lwhsu@freebsd.org
DPorts devel/py-magic 5.38 devel lwhsu@freebsd.org
DPorts sysutils/file 5.38 sysutils jharris@widomaker.com
Entware
aarch64-k3.10
file 5.38 utils marko.ratkaj@sartura.hr
Entware
aarch64-k3.10
libmagic 5.38 libs marko.ratkaj@sartura.hr
Entware
armv5sf-k3.2
file 5.38 utils marko.ratkaj@sartura.hr
Entware
armv5sf-k3.2
libmagic 5.38 libs marko.ratkaj@sartura.hr
Entware
armv7sf-k2.6
file 5.38 utils marko.ratkaj@sartura.hr
Entware
armv7sf-k2.6
libmagic 5.38 libs marko.ratkaj@sartura.hr
Entware
armv7sf-k3.2
file 5.38 utils marko.ratkaj@sartura.hr
Entware
armv7sf-k3.2
libmagic 5.38 libs marko.ratkaj@sartura.hr
Entware
mipselsf-k3.4
file 5.38 utils marko.ratkaj@sartura.hr
Entware
mipselsf-k3.4
libmagic 5.38 libs marko.ratkaj@sartura.hr
Entware
mipssf-k3.4
file 5.38 utils marko.ratkaj@sartura.hr
Entware
mipssf-k3.4
libmagic 5.38 libs marko.ratkaj@sartura.hr
Entware
x64-k3.2
file 5.38 utils marko.ratkaj@sartura.hr
Entware
x64-k3.2
libmagic 5.38 libs marko.ratkaj@sartura.hr
Exherbo
arbor
sys-apps/file 5.39 sys-apps fallback-mnt-exherbo@repology
Fedora 26
release
file 5.30 Potentially vulnerable Applications/File -
Fedora 26
updates
file 5.30 Potentially vulnerable Applications/File -
Fedora 27
release
file 5.31 Potentially vulnerable Applications/File -
Fedora 27
updates
file 5.31 Potentially vulnerable Applications/File -
Fedora 28
updates
file 5.33 Potentially vulnerable Applications/File -
Fedora 28
release
file 5.32 Potentially vulnerable Applications/File -
Fedora 29
release
file 5.34 Potentially vulnerable Unspecified -
Fedora 29
updates
file 5.34 Potentially vulnerable Unspecified -
Fedora 30
release
file 5.36 Potentially vulnerable Unspecified -
Fedora 30
updates
file 5.36 Potentially vulnerable Unspecified -
Fedora 31
release
file 5.37 Potentially vulnerable Unspecified -
Fedora 31
updates
file 5.37 Potentially vulnerable Unspecified -
Fedora 32
release
file 5.38 Unspecified -
Fedora Rawhide file 5.39 Unspecified -
FreeBSD Ports devel/py-magic 5.39 devel lwhsu@freebsd.org
FreeBSD Ports devel/py-magic 5.39 devel lwhsu@freebsd.org
FreeBSD Ports sysutils/file 5.39 sysutils jharris@widomaker.com
Funtoo 1.4
core-kit
sys-apps/file 9999 sys-apps base-system@gentoo.org
Funtoo 1.4
core-kit
sys-apps/file 5.37 Potentially vulnerable sys-apps base-system@gentoo.org
Funtoo 1.4
core-kit
sys-apps/file 5.36 Potentially vulnerable sys-apps base-system@gentoo.org
Gentoo sys-apps/file 9999 sys-apps base-system@gentoo.org
Gentoo sys-apps/file 5.39 sys-apps base-system@gentoo.org
Gentoo sys-apps/file 5.39 sys-apps base-system@gentoo.org
Gentoo sys-apps/file 5.39 sys-apps base-system@gentoo.org
Gentoo sys-apps/file 5.38 sys-apps base-system@gentoo.org
Gentoo sys-apps/file 5.37 Potentially vulnerable sys-apps base-system@gentoo.org
GNU Guix file 5.38 - -
GoboLinux File 5.34 Potentially vulnerable - -
HaikuPorts master sys-apps/file 5.38 sys-apps -
Homebrew libmagic 5.39 - -
HP-UX 11.31
hppa_32
file 5.39 - -
HP-UX 11.31
ia64_64
file 5.39 - -
HP-UX 11.31
hppa_32
file 5.31 Potentially vulnerable - -
HP-UX 11.31
ia64_32
file 5.31 Potentially vulnerable - -
HP-UX 11.31
hppa_32
file 5.16 Potentially vulnerable - -
Hyperbola
core
file 5.30 Potentially vulnerable - -
Hyperbola
community
python-magic 5.29 Potentially vulnerable - -
Hyperbola
community
python2-magic 5.29 Potentially vulnerable - -
IBM i file 5.32 Potentially vulnerable Unspecified -
Kali Linux Rolling
main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
KaOS
core
file 5.39 - demm@kaosx.us
KISS Linux Community
community
file 5.39 - dylan.araps@gmail.com
Kwort 4.3.2 file 5.33 Potentially vulnerable - -
Kwort 4.3.3 file 5.36 Potentially vulnerable - -
Kwort 4.3.4 file 5.39 - -
LiGurOS 20.7
core-kit
sys-apps/file 9999 sys-apps base-system@gentoo.org
LiGurOS 20.7
core-kit
sys-apps/file 5.39 sys-apps base-system@gentoo.org
LiGurOS 20.7
core-kit
sys-apps/file 5.39 sys-apps base-system@gentoo.org
LiGurOS 20.7
core-kit
sys-apps/file 5.39 sys-apps base-system@gentoo.org
LiGurOS 20.7
core-kit
sys-apps/file 5.38 sys-apps base-system@gentoo.org
LiGurOS 20.7
core-kit
sys-apps/file 5.37 Potentially vulnerable sys-apps base-system@gentoo.org
LiGurOS 21.1
core-kit
sys-apps/file 9999 sys-apps base-system@gentoo.org
LiGurOS 21.1
core-kit
sys-apps/file 5.39 sys-apps base-system@gentoo.org
LiGurOS 21.1
core-kit
sys-apps/file 5.39 sys-apps base-system@gentoo.org
LiGurOS 21.1
core-kit
sys-apps/file 5.39 sys-apps base-system@gentoo.org
LiGurOS 21.1
core-kit
sys-apps/file 5.38 sys-apps base-system@gentoo.org
LiGurOS 21.1
core-kit
sys-apps/file 5.37 Potentially vulnerable sys-apps base-system@gentoo.org
Linuxbrew libmagic 5.39 - -
MacPorts file 5.39 sysutils ryandesign@macports, ryandesign@github
MacPorts libmagic 5.39 sysutils ryandesign@macports, ryandesign@github
Maemo Fremantle file 4.12 Potentially vulnerable - piefel@debian.org
Mageia 6
core/release
file 5.25 Potentially vulnerable File tools -
Mageia 6
core/updates
file 5.25 Potentially vulnerable File tools -
Mageia 6
core/updates
file 5.25 Potentially vulnerable File tools -
Mageia 7
core/updates
file 5.37 Potentially vulnerable File tools -
Mageia 7
core/updates
file 5.37 Potentially vulnerable File tools -
Mageia 7
core/release
file 5.36 Potentially vulnerable File tools -
Mageia Cauldron
core/release
file 5.39 File tools -
Manjaro Stable
community
python-magic 5.39 - -
Manjaro Stable
core
file 5.39 - -
Manjaro Testing
core
file 5.39 - -
Manjaro Testing
community
python-magic 5.39 - -
Manjaro Unstable
community
python-magic 5.39 - -
Manjaro Unstable
core
file 5.39 - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-file 5.39 - alexpux@gmail.com
MSYS2 mingw
i686
mingw-w64-i686-file 5.39 - alexpux@gmail.com
MSYS2 msys2
x86_64
file 5.39 base-devel alexpux@gmail.com
MSYS2 msys2
i686
file 5.38 base alexpux@gmail.com
nixpkgs stable file 5.38 - fallback-mnt-nix@repology
nixpkgs unstable file 5.39 - fallback-mnt-nix@repology
OpenBSD Ports devel/libmagic 5.39 sysutils ports@openbsd.org
openEuler 20.03
source
file 5.38 Unspecified -
OpenIndiana packages
hipster
file 5.39 System/Libraries -
OpenIndiana packages
hipster
file 5.39 System/Text Tools -
OpenIndiana packages
hipster
file 5.38 System/Libraries -
OpenIndiana packages
hipster
file 5.38 System/Text Tools -
OpenMandriva 3.0
main/updates
file 5.33 Potentially vulnerable File tools tpgxyz@gmail.com
OpenMandriva 3.0
main/release
file 5.25 Potentially vulnerable File tools tpgxyz@gmail.com
OpenMandriva 4.0
main/release
file 5.37 Potentially vulnerable File tools bero@lindev.ch
OpenMandriva 4.1
main/release
file 5.38 File tools nobodydead@gmail.com
OpenMandriva Rolling
main/release
file 5.39 File tools bero@lindev.ch
OpenMandriva Cooker
main/release
file 5.39 File tools bero@lindev.ch
OpenPKG file 5.39 Filesystem -
openSUSE Leap 42.3
updates/oss
file 5.22 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 42.3
updates/oss
file 5.22 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 42.3
updates/oss
file 5.22 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 42.3
updates/oss
python-magic 5.22 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 42.3
updates/oss
python-magic 5.22 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 42.3
updates/oss
python-magic 5.22 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 42.3
main/oss
file 5.19 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 42.3
main/oss
python-magic 5.19 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.0
main/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.0
main/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.0
updates/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.0
updates/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.1
main/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.1
main/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.1
updates/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.1
updates/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Leap 15.2
main/oss
file 5.32 Potentially vulnerable Productivity/File utilities -
openSUSE Leap 15.2
main/oss
python-magic 5.32 Potentially vulnerable Development/Languages/Python -
openSUSE Tumbleweed file 5.39 Productivity/File utilities -
openSUSE Tumbleweed python-magic 5.39 Development/Languages/Python -
OpenWrt 17.01 x86_64
packages
file 5.25 Potentially vulnerable utils luka@openwrt.org
OpenWrt 17.01 x86_64
packages
libmagic 5.25 Potentially vulnerable libs luka@openwrt.org
OpenWrt 18.06 x86_64
packages
file 5.25 Potentially vulnerable utils marko.ratkaj@sartura.hr
OpenWrt 18.06 x86_64
packages
libmagic 5.25 Potentially vulnerable libs marko.ratkaj@sartura.hr
OpenWrt 19.07 x86_64
packages
file 5.37 Potentially vulnerable utils marko.ratkaj@sartura.hr
OpenWrt 19.07 x86_64
packages
libmagic 5.37 Potentially vulnerable libs marko.ratkaj@sartura.hr
Parabola
core
file 5.39 - -
Parabola
community
python-magic 5.39 - -
Parabola Testing
libre-testing
file-debug 5.38 - -
Pardus
main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Pardus
updates/main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Parrot
main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
PCLinuxOS file 5.38 File tools -
Pisi Linux
core
file 5.38 app:console admins@pisilinux.org
pkgsrc current sysutils/file 5.38 sysutils pkgsrc-users@netbsd.org
PLD Linux file 5.39 - -
PureOS Amber file 5.35 Potentially vulnerable misc debian.axhn@manchmal.in-ulm.de
PureOS landing file 5.38 misc debian.axhn@manchmal.in-ulm.de
Raspbian Oldstable
main
file 5.30 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Raspbian Stable
main
file 5.35 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Raspbian Testing
main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
Ravenports file 5.39 sysutils fallback-mnt-ravenports@repology
Rosa 2014.1
main/updates
file 5.28 Potentially vulnerable - -
Rosa 2014.1
main/release
file 5.19 Potentially vulnerable - -
Rosa 2016.1
main/updates
file 5.31 Potentially vulnerable - -
Rosa 2016.1
main/release
file 5.28 Potentially vulnerable - -
Rosa 2019.1
main/release
file 5.38 File tools alexander@mezon.ru
Rosa Server 6.9
base/release
file 5.04 Potentially vulnerable Applications/File andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
file 5.04 Potentially vulnerable Applications/File andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
file 5.11 Potentially vulnerable Applications/File alex2048@mail.ru
Rosa Server 7.5
base/release
file 5.11 Potentially vulnerable Applications/File alex2048@mail.ru
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scientific Linux 7.x file 5.11 Potentially vulnerable Applications/File -
Scoop
main
file 5.03 Potentially vulnerable - -
Slackware 14.2
patches
file 5.36 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
file 5.25 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
file 5.39 - volkerdi@slackware.com
Slackware64 14.2
patches
file 5.36 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
file 5.25 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
file 5.39 - volkerdi@slackware.com
Slackwarearm 14.2
patches
file 5.36 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
file 5.25 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
file 5.39 - volkerdi@slackware.com
SliTaz Cooking file 5.38 system-tools erjo@slitaz.org
SliTaz Cooking libmagic 5.38 system-tools erjo@slitaz.org
SliTaz Cooking libmagic-dev 5.38 development erjo@slitaz.org
SliTaz Cooking python-magic 5.38 development erjo@slitaz.org
SliTaz Next file 5.34 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Next libmagic 5.34 Potentially vulnerable libs devel@slitaz.org
SliTaz Next libmagic-dev 5.34 Potentially vulnerable development devel@slitaz.org
SliTaz Next python-magic 5.34 Potentially vulnerable development devel@slitaz.org
Solus file 5.39 system.base joshua@streambits.io
Solus file-dbginfo 5.39 debug joshua@streambits.io
Solus file-devel 5.39 system.devel joshua@streambits.io
T2 SDE file 5.39 base/tool rene@t2-project.org
Termux file 5.39 - termux@termux
Trisquel 6.0
toutatis/main
file 5.09 Potentially vulnerable utils daniel.baumann@progress-technologies.net, fgrfgr@freenet.de
Trisquel 6.0
toutatis-updates/main
file 5.09 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, fgrfgr@freenet.de
Trisquel 7.0
belenos/main
file 5.14 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos-updates/main
file 5.14 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
file 5.25 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas-updates/main
file 5.25 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 12.04
precise/main
file 5.09 Potentially vulnerable utils daniel.baumann@progress-technologies.net, fgrfgr@freenet.de
Ubuntu 12.04
precise-updates/main
file 5.09 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, fgrfgr@freenet.de
Ubuntu 14.04
trusty/main
file 5.14 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
file 5.14 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/main
file 5.25 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial-updates/main
file 5.25 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/main
file 5.32 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Ubuntu 18.04
bionic-updates/main
file 5.32 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 19.10
eoan/main
file 5.37 Potentially vulnerable utils debian.axhn@manchmal.in-ulm.de
Ubuntu 19.10
eoan-updates/main
file 5.37 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
Ubuntu 20.10
groovy/main
file 5.38 utils debian.axhn@manchmal.in-ulm.de
Vcpkg libmagic 5.37 Potentially vulnerable - -
Void Linux x86_64
x86_64
file 5.39 - gottox@voidlinux.org
Void Linux x86_64
x86_64
file-devel 5.39 - gottox@voidlinux.org
Void Linux x86_64
x86_64
libmagic 5.39 - gottox@voidlinux.org
Wikidata file 5.39 - -

Absent in repositories

  • antiX-16
  • antiX-17
  • antiX-19
  • Arch Testing
  • BlackBox 6
  • BlackBox 7
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Carbs Linux
  • Chakra Staging
  • Chakra Testing
  • Chocolatey
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Deb Multimedia Unstable
  • Debian Stable Backports
  • Debian Experimental
  • ELRepo el7
  • ELRepo el7 Testing
  • EPEL 6
  • EPEL 7
  • EPEL 8
  • F-Droid
  • freshcode.club
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • GNU Elpa
  • Hackage
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • just-install
  • KaOS Build
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon Experimental
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Games
  • KISS Linux Main
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linux Mint 20.0
  • LuaRocks
  • MELPA
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable
  • Npackd Stable64
  • Npackd Unstable
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Pisi Linux Contrib
  • ReactOS rapps
  • RebornOS
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Salix 14.2
  • Siduction
  • Siduction Experimental
  • SlackBuilds
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • winget
  • YACP