Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2014:1606 - Security Advisory
Issued:
2014-10-14
Updated:
2014-10-14

RHSA-2014:1606 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: file security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated file packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The "file" command is used to identify a particular file according to the
type of data contained in the file. The command can identify various file
types, including ELF binaries, system libraries, RPM packages, and
different graphics formats.

Multiple denial of service flaws were found in the way file parsed certain
Composite Document Format (CDF) files. A remote attacker could use either
of these flaws to crash file, or an application using file, via a specially
crafted CDF file. (CVE-2014-0237, CVE-2014-0238, CVE-2014-3479,
CVE-2014-3480, CVE-2012-1571)

Two denial of service flaws were found in the way file handled indirect and
search rules. A remote attacker could use either of these flaws to cause
file, or an application using file, to crash or consume an excessive amount
of CPU. (CVE-2014-1943, CVE-2014-2270)

This update also fixes the following bugs:

  • Previously, the output of the "file" command contained redundant white

spaces. With this update, the new STRING_TRIM flag has been introduced to
remove the unnecessary white spaces. (BZ#664513)

  • Due to a bug, the "file" command could incorrectly identify an XML

document as a LaTex document. The underlying source code has been modified
to fix this bug and the command now works as expected. (BZ#849621)

  • Previously, the "file" command could not recognize .JPG files and

incorrectly labeled them as "Minix filesystem". This bug has been fixed and
the command now properly detects .JPG files. (BZ#873997)

  • Under certain circumstances, the "file" command incorrectly detected

NETpbm files as "x86 boot sector". This update applies a patch to fix this
bug and the command now detects NETpbm files as expected. (BZ#884396)

  • Previously, the "file" command incorrectly identified ASCII text files as

a .PIC image file. With this update, a patch has been provided to address
this bug and the command now correctly recognizes ASCII text files.
(BZ#980941)

  • On 32-bit PowerPC systems, the "from" field was missing from the output

of the "file" command. The underlying source code has been modified to fix
this bug and "file" output now contains the "from" field as expected.
(BZ#1037279)

  • The "file" command incorrectly detected text files as "RRDTool DB version

ool - Round Robin Database Tool". This update applies a patch to fix this
bug and the command now correctly detects text files. (BZ#1064463)

  • Previously, the "file" command supported only version 1 and 2 of the QCOW

format. As a consequence, file was unable to detect a "qcow2 compat=1.1"
file created on Red Hat Enterprise Linux 7. With this update, support for
QCOW version 3 has been added so that the command now detects such files as
expected. (BZ#1067771)

All file users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 664513 - too many spaces ...
  • BZ - 805197 - CVE-2012-1571 file: out of bounds read in CDF parser
  • BZ - 849621 - file is coming back with 'LaTeX document text' instead of 'XML document text'
  • BZ - 873997 - file thinks the attached jpg is "Minix filesystem, V2, 50968 zones"
  • BZ - 884396 - file detects netpbm files as x86 boot sector type sometimes
  • BZ - 980941 - file reported wrong file type (reported .PIC image file instead of ASCII text file)
  • BZ - 1064463 - text file detected as 'RRDTool DB version ool - Round Robin Database Tool'
  • BZ - 1065836 - CVE-2014-1943 file: unrestricted recursion in handling of indirect type rules
  • BZ - 1067771 - file unable to detect qcow2 compat=1.1 img created by RHEL7
  • BZ - 1072220 - CVE-2014-2270 file: out-of-bounds access in search rules with offsets from input file
  • BZ - 1098155 - CVE-2014-0238 file: CDF property info parsing nelements infinite loop
  • BZ - 1098193 - CVE-2014-0237 file: cdf_unpack_summary_info() excessive looping DoS
  • BZ - 1104858 - CVE-2014-3480 file: cdf_count_chain insufficient boundary check
  • BZ - 1104869 - CVE-2014-3479 file: cdf_check_stream_offset insufficient boundary check

CVEs

  • CVE-2014-0237
  • CVE-2014-0238
  • CVE-2014-3479
  • CVE-2014-3480
  • CVE-2014-1943
  • CVE-2014-2270
  • CVE-2012-1571

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
file-5.04-21.el6.src.rpm SHA-256: e239185c736ad2e59094c4fd1be9b351d32a79773b0ec8571d4c912b46cf9e23
x86_64
file-5.04-21.el6.x86_64.rpm SHA-256: 5f2464abc6fbe52f5ab275479b8b83da29e0751569ef0369e0a10d7376e48827
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-devel-5.04-21.el6.x86_64.rpm SHA-256: fa5665d9a7bd686ba6a73205854b54fc439752e5974bc1aae578a79b9a1c5054
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-libs-5.04-21.el6.x86_64.rpm SHA-256: 06fcabc511f081276ec248430a47500c7cd96860a96390cf61201fc89472a57f
file-static-5.04-21.el6.x86_64.rpm SHA-256: da58306d32bd5c1ca3d0ba7d623dfc4b9b931778db0f2f92e0611e390402c91f
python-magic-5.04-21.el6.x86_64.rpm SHA-256: 24fa19a96ab29fe3bb089b9c1db2bad8287c194c941684605e9d7336fd14e72f
i386
file-5.04-21.el6.i686.rpm SHA-256: 1776c096bb969c585dc44ff9c06012b2a1110a11db9ea1e46199de06f9f7b44d
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-static-5.04-21.el6.i686.rpm SHA-256: 98ff97b772b1cecfc1a43cf7a27a83fbb10603b55b92f84fa925e0b268516685
python-magic-5.04-21.el6.i686.rpm SHA-256: 298d1124c9f0f2d44f40a89d7164e8e5c6e742887b9ac5ab4d821a4c596b6d6d

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
file-5.04-21.el6.src.rpm SHA-256: e239185c736ad2e59094c4fd1be9b351d32a79773b0ec8571d4c912b46cf9e23
i386
file-5.04-21.el6.i686.rpm SHA-256: 1776c096bb969c585dc44ff9c06012b2a1110a11db9ea1e46199de06f9f7b44d
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-static-5.04-21.el6.i686.rpm SHA-256: 98ff97b772b1cecfc1a43cf7a27a83fbb10603b55b92f84fa925e0b268516685
python-magic-5.04-21.el6.i686.rpm SHA-256: 298d1124c9f0f2d44f40a89d7164e8e5c6e742887b9ac5ab4d821a4c596b6d6d
x86_64
file-5.04-21.el6.x86_64.rpm SHA-256: 5f2464abc6fbe52f5ab275479b8b83da29e0751569ef0369e0a10d7376e48827
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-devel-5.04-21.el6.x86_64.rpm SHA-256: fa5665d9a7bd686ba6a73205854b54fc439752e5974bc1aae578a79b9a1c5054
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-libs-5.04-21.el6.x86_64.rpm SHA-256: 06fcabc511f081276ec248430a47500c7cd96860a96390cf61201fc89472a57f
file-static-5.04-21.el6.x86_64.rpm SHA-256: da58306d32bd5c1ca3d0ba7d623dfc4b9b931778db0f2f92e0611e390402c91f
python-magic-5.04-21.el6.x86_64.rpm SHA-256: 24fa19a96ab29fe3bb089b9c1db2bad8287c194c941684605e9d7336fd14e72f

Red Hat Enterprise Linux Workstation 6

SRPM
file-5.04-21.el6.src.rpm SHA-256: e239185c736ad2e59094c4fd1be9b351d32a79773b0ec8571d4c912b46cf9e23
x86_64
file-5.04-21.el6.x86_64.rpm SHA-256: 5f2464abc6fbe52f5ab275479b8b83da29e0751569ef0369e0a10d7376e48827
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-devel-5.04-21.el6.x86_64.rpm SHA-256: fa5665d9a7bd686ba6a73205854b54fc439752e5974bc1aae578a79b9a1c5054
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-libs-5.04-21.el6.x86_64.rpm SHA-256: 06fcabc511f081276ec248430a47500c7cd96860a96390cf61201fc89472a57f
file-static-5.04-21.el6.x86_64.rpm SHA-256: da58306d32bd5c1ca3d0ba7d623dfc4b9b931778db0f2f92e0611e390402c91f
python-magic-5.04-21.el6.x86_64.rpm SHA-256: 24fa19a96ab29fe3bb089b9c1db2bad8287c194c941684605e9d7336fd14e72f
i386
file-5.04-21.el6.i686.rpm SHA-256: 1776c096bb969c585dc44ff9c06012b2a1110a11db9ea1e46199de06f9f7b44d
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-static-5.04-21.el6.i686.rpm SHA-256: 98ff97b772b1cecfc1a43cf7a27a83fbb10603b55b92f84fa925e0b268516685
python-magic-5.04-21.el6.i686.rpm SHA-256: 298d1124c9f0f2d44f40a89d7164e8e5c6e742887b9ac5ab4d821a4c596b6d6d

Red Hat Enterprise Linux Desktop 6

SRPM
file-5.04-21.el6.src.rpm SHA-256: e239185c736ad2e59094c4fd1be9b351d32a79773b0ec8571d4c912b46cf9e23
x86_64
file-5.04-21.el6.x86_64.rpm SHA-256: 5f2464abc6fbe52f5ab275479b8b83da29e0751569ef0369e0a10d7376e48827
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-devel-5.04-21.el6.x86_64.rpm SHA-256: fa5665d9a7bd686ba6a73205854b54fc439752e5974bc1aae578a79b9a1c5054
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-libs-5.04-21.el6.x86_64.rpm SHA-256: 06fcabc511f081276ec248430a47500c7cd96860a96390cf61201fc89472a57f
file-static-5.04-21.el6.x86_64.rpm SHA-256: da58306d32bd5c1ca3d0ba7d623dfc4b9b931778db0f2f92e0611e390402c91f
python-magic-5.04-21.el6.x86_64.rpm SHA-256: 24fa19a96ab29fe3bb089b9c1db2bad8287c194c941684605e9d7336fd14e72f
python-magic-5.04-21.el6.x86_64.rpm SHA-256: 24fa19a96ab29fe3bb089b9c1db2bad8287c194c941684605e9d7336fd14e72f
i386
file-5.04-21.el6.i686.rpm SHA-256: 1776c096bb969c585dc44ff9c06012b2a1110a11db9ea1e46199de06f9f7b44d
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-static-5.04-21.el6.i686.rpm SHA-256: 98ff97b772b1cecfc1a43cf7a27a83fbb10603b55b92f84fa925e0b268516685
python-magic-5.04-21.el6.i686.rpm SHA-256: 298d1124c9f0f2d44f40a89d7164e8e5c6e742887b9ac5ab4d821a4c596b6d6d
python-magic-5.04-21.el6.i686.rpm SHA-256: 298d1124c9f0f2d44f40a89d7164e8e5c6e742887b9ac5ab4d821a4c596b6d6d

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
file-5.04-21.el6.src.rpm SHA-256: e239185c736ad2e59094c4fd1be9b351d32a79773b0ec8571d4c912b46cf9e23
s390x
file-5.04-21.el6.s390x.rpm SHA-256: e9dd412f39ea8a1e5410bf3391f8a2f17368903ab7219524de0879049db8b5b4
file-debuginfo-5.04-21.el6.s390.rpm SHA-256: 6fbf1c33e96ee5be248cdcc970d39c5fbfe1951922ddc0a62a3ac8ada4a87778
file-debuginfo-5.04-21.el6.s390x.rpm SHA-256: 6604af76d18ab23cab9489d8d2d34273aae12b709b8a1af6f415b91e5458e49e
file-debuginfo-5.04-21.el6.s390x.rpm SHA-256: 6604af76d18ab23cab9489d8d2d34273aae12b709b8a1af6f415b91e5458e49e
file-devel-5.04-21.el6.s390.rpm SHA-256: c3d340864b450ad505c6700e8efca3599e4e573c9c15fa7edbca06e6c646ffb4
file-devel-5.04-21.el6.s390x.rpm SHA-256: b7330f97b64e9703c79187bc2093882a227226cf10c0dbd9b15e7fe89984c0fa
file-libs-5.04-21.el6.s390.rpm SHA-256: 69b4467d6a1b8d6ff63c692f9ad15babebf9e6adddcd77c1384c19d563383408
file-libs-5.04-21.el6.s390x.rpm SHA-256: c046729c0e03614338a5feb216dff2b5bc5ebf49e1d89e3d77c155930fe13511
file-static-5.04-21.el6.s390x.rpm SHA-256: c28b2e0eb052130cb47818bf16a80ea75085e85299ba4588a204337e26432ccb
python-magic-5.04-21.el6.s390x.rpm SHA-256: 4040a226e56773a3545777bb2470b8d1cda0cccab524e35e62e3381797c75680

Red Hat Enterprise Linux for Power, big endian 6

SRPM
file-5.04-21.el6.src.rpm SHA-256: e239185c736ad2e59094c4fd1be9b351d32a79773b0ec8571d4c912b46cf9e23
ppc64
file-5.04-21.el6.ppc64.rpm SHA-256: 51048a509f9ab84640b8e54338274afb6460daf4364aaf3d1b7f86f105909ea1
file-debuginfo-5.04-21.el6.ppc.rpm SHA-256: d5cf6b4de46aed2eb24a1e0ab9bad16c5aa0db3cc58b5819118ce69a68feff9d
file-debuginfo-5.04-21.el6.ppc64.rpm SHA-256: cb655524a0ec59213c3c25f10a2d2388388a03eb51e372c662b0df8849690981
file-debuginfo-5.04-21.el6.ppc64.rpm SHA-256: cb655524a0ec59213c3c25f10a2d2388388a03eb51e372c662b0df8849690981
file-devel-5.04-21.el6.ppc.rpm SHA-256: 755b04ce66a9b0027df5f8e0291cc3a05b0eed86786a2afcc857510a1e85b206
file-devel-5.04-21.el6.ppc64.rpm SHA-256: 07cde42f503966a4f1e71da3be26e3c2d8f7ce2b68b3999bec24d1dcddc8e4ab
file-libs-5.04-21.el6.ppc.rpm SHA-256: 7f30f6506f3cd54e64672f91e8c8230533260fc8765b0e81839b7d9ffa55bec5
file-libs-5.04-21.el6.ppc64.rpm SHA-256: 0bf2aadfe9b4f3200ac7456c2be20f5cebfa8a8e6be365c81a6d00e308c1adae
file-static-5.04-21.el6.ppc64.rpm SHA-256: b8532e8b70f0e16822df4511e9ff366836c7eea51aad4ed21cec0fc9df340eca
python-magic-5.04-21.el6.ppc64.rpm SHA-256: cf40eb9a2646b29b2e7496d19065ee60efe9d3f303bda54c6207e26cb2ae498b

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
file-5.04-21.el6.src.rpm SHA-256: e239185c736ad2e59094c4fd1be9b351d32a79773b0ec8571d4c912b46cf9e23
x86_64
file-5.04-21.el6.x86_64.rpm SHA-256: 5f2464abc6fbe52f5ab275479b8b83da29e0751569ef0369e0a10d7376e48827
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-devel-5.04-21.el6.x86_64.rpm SHA-256: fa5665d9a7bd686ba6a73205854b54fc439752e5974bc1aae578a79b9a1c5054
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-libs-5.04-21.el6.x86_64.rpm SHA-256: 06fcabc511f081276ec248430a47500c7cd96860a96390cf61201fc89472a57f
file-static-5.04-21.el6.x86_64.rpm SHA-256: da58306d32bd5c1ca3d0ba7d623dfc4b9b931778db0f2f92e0611e390402c91f
python-magic-5.04-21.el6.x86_64.rpm SHA-256: 24fa19a96ab29fe3bb089b9c1db2bad8287c194c941684605e9d7336fd14e72f
python-magic-5.04-21.el6.x86_64.rpm SHA-256: 24fa19a96ab29fe3bb089b9c1db2bad8287c194c941684605e9d7336fd14e72f

Red Hat Enterprise Linux Server from RHUI 6

SRPM
file-5.04-21.el6.src.rpm SHA-256: e239185c736ad2e59094c4fd1be9b351d32a79773b0ec8571d4c912b46cf9e23
x86_64
file-5.04-21.el6.x86_64.rpm SHA-256: 5f2464abc6fbe52f5ab275479b8b83da29e0751569ef0369e0a10d7376e48827
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-debuginfo-5.04-21.el6.x86_64.rpm SHA-256: 6d5e04c6325f9ef4b866757903793bd1b2ebba7cadaf27f0b0204f94ec124f85
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-devel-5.04-21.el6.x86_64.rpm SHA-256: fa5665d9a7bd686ba6a73205854b54fc439752e5974bc1aae578a79b9a1c5054
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-libs-5.04-21.el6.x86_64.rpm SHA-256: 06fcabc511f081276ec248430a47500c7cd96860a96390cf61201fc89472a57f
file-static-5.04-21.el6.x86_64.rpm SHA-256: da58306d32bd5c1ca3d0ba7d623dfc4b9b931778db0f2f92e0611e390402c91f
python-magic-5.04-21.el6.x86_64.rpm SHA-256: 24fa19a96ab29fe3bb089b9c1db2bad8287c194c941684605e9d7336fd14e72f
i386
file-5.04-21.el6.i686.rpm SHA-256: 1776c096bb969c585dc44ff9c06012b2a1110a11db9ea1e46199de06f9f7b44d
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-debuginfo-5.04-21.el6.i686.rpm SHA-256: 901c79d9d44640967fadf1a434385c244ba4e8ff75d10ff356b1a91b990f0a95
file-devel-5.04-21.el6.i686.rpm SHA-256: f98a465af669d53bc5feab419165167f51cd59a123ca5d449009f1136710fc11
file-libs-5.04-21.el6.i686.rpm SHA-256: 5f198c9ef940e961a9f2fe4d13eea49cea8c3e83151a09304554df5f2c819e80
file-static-5.04-21.el6.i686.rpm SHA-256: 98ff97b772b1cecfc1a43cf7a27a83fbb10603b55b92f84fa925e0b268516685
python-magic-5.04-21.el6.i686.rpm SHA-256: 298d1124c9f0f2d44f40a89d7164e8e5c6e742887b9ac5ab4d821a4c596b6d6d

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
file-5.04-21.el6.src.rpm SHA-256: e239185c736ad2e59094c4fd1be9b351d32a79773b0ec8571d4c912b46cf9e23
s390x
file-5.04-21.el6.s390x.rpm SHA-256: e9dd412f39ea8a1e5410bf3391f8a2f17368903ab7219524de0879049db8b5b4
file-debuginfo-5.04-21.el6.s390.rpm SHA-256: 6fbf1c33e96ee5be248cdcc970d39c5fbfe1951922ddc0a62a3ac8ada4a87778
file-debuginfo-5.04-21.el6.s390x.rpm SHA-256: 6604af76d18ab23cab9489d8d2d34273aae12b709b8a1af6f415b91e5458e49e
file-debuginfo-5.04-21.el6.s390x.rpm SHA-256: 6604af76d18ab23cab9489d8d2d34273aae12b709b8a1af6f415b91e5458e49e
file-devel-5.04-21.el6.s390.rpm SHA-256: c3d340864b450ad505c6700e8efca3599e4e573c9c15fa7edbca06e6c646ffb4
file-devel-5.04-21.el6.s390x.rpm SHA-256: b7330f97b64e9703c79187bc2093882a227226cf10c0dbd9b15e7fe89984c0fa
file-libs-5.04-21.el6.s390.rpm SHA-256: 69b4467d6a1b8d6ff63c692f9ad15babebf9e6adddcd77c1384c19d563383408
file-libs-5.04-21.el6.s390x.rpm SHA-256: c046729c0e03614338a5feb216dff2b5bc5ebf49e1d89e3d77c155930fe13511
file-static-5.04-21.el6.s390x.rpm SHA-256: c28b2e0eb052130cb47818bf16a80ea75085e85299ba4588a204337e26432ccb
python-magic-5.04-21.el6.s390x.rpm SHA-256: 4040a226e56773a3545777bb2470b8d1cda0cccab524e35e62e3381797c75680

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter