Skip to navigation

Bug Fix Advisory file bug fix update

Advisory: RHBA-2012:1029-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated file packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 5.

The File utility is used to identify a particular file according to the type of
data contained in the file.

This update fixes the following bugs:

* Prior to this update, the swap signature on the Itanium architecture was not
stored in the same place as on other architectures. As a consequence, the file
utility failed to detect the swap signature on Itanium. This update adds a new
"magic" pattern to detect the swap signature on Itanium architecture.
(BZ#758105)

* Prior to this update, the "magic" pattern to detect Infocom Game Data was too
weak. As a consequence, Some files were wrongly identified as Infocom Game Data
when they were actually in different format. This update modifies the Infocom
Game Data "magic" pattern so only valid Infocom Game Data files are detected by
this pattern. (BZ#789830)

* Prior to this update, the file utility did not contain a "magic" pattern to
detect zip64 (zip 3.0) files. As a consequence, the file utility failed to
detect archives in the zip64 format. This update adds a new "magic" pattern to
detect the zip64 format. (BZ#758631)

* Prior to this update, the file utility did not contain a "magic" pattern to
detect WebM video files. As a consequence, the file utility failed to detect
WebM video files. This update adds a new "magic" pattern to detect the WebM
files. (BZ#758634)

* Prior to this update, the file utility did not contain a "magic" pattern to
detect LZMA archives. As a consequence, the file utility failed to detect
archives in LZMA format were not detected. This update adds a new "magic"
pattern to detect the LZMA files. (BZ#809801)

* Prior to this update, the "magic" pattern to detect Dell BIOS headers was
outdated. As a consequence, the file utility failed to detect newer BIOS
formats. This update modifies the ""magic"" pattern to detect also new formats
of Dell BIOS correctly. (BZ#826899)

* Prior to this update, the file utility contained ""magic"" patterns that
incorrectly detected files according to one byte only. As a consequence, Unicode
text files that contained the particular byte in a particular position could be
incorrectly recognized as DOS executable files. This update removes the
problematic patterns. Patterns that match less than 16 bits are no longer
accepted, and the utility no longer detects Unicode files as DOS executables.
(BZ#826901)

All users of the file utility are advised to upgrade to these updated packages,
which fix these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
file-4.17-28.src.rpm     MD5: 41c8c3b29b1407948b08b770ac8f13b3
SHA-256: 675ce8e76d05bcf4c70fb50fcea0ca837d00be0aff4fbf33f7ce0f43a5481499
 
IA-32:
file-4.17-28.i386.rpm     MD5: c5980e6964711a25bdf4bc6e92354552
SHA-256: 30474fa6a4f8aacd722d3047c56b07235b4fae5bdd951c28dd5e838e7821e1b1
file-debuginfo-4.17-28.i386.rpm     MD5: 8ce78f34cb8da8fb7766a716e551d0a0
SHA-256: c7a803b916945efed588391d6e06259ae9b4c47ab71d5caeaa42566b8d700104
 
IA-64:
file-4.17-28.ia64.rpm     MD5: f5244b425542ac2cbfeb52ad0e16ecf7
SHA-256: f44ba0bca4c52707ad21d1281df458dabcda0610bd320af957d8dc970b81ab23
file-debuginfo-4.17-28.ia64.rpm     MD5: adcd28be7ba318d6ec90998335668e5f
SHA-256: 9c43c916fc42fea0b5b6022c182fccef0b6618652521994c4a12b10cfef66fc8
 
PPC:
file-4.17-28.ppc.rpm     MD5: 9baaf5314dd2d246e238f438c22d47a4
SHA-256: d8a4e8172a97f57969b92e69b10185a6818a83f3ed8926a49e53df34cb0c6403
file-debuginfo-4.17-28.ppc.rpm     MD5: daa765c5ce4ee60d97bb5eb248c6cd37
SHA-256: afff05d3ece7106782f11a84690c528eeab7824b23ec7059229c48a3ab6dfb01
 
s390x:
file-4.17-28.s390x.rpm     MD5: 6e72429a47da7168d4e6709bc8d78951
SHA-256: bf6505238c87c6097f2e843cd9b35dbbb6a34ceb71d2eee567c800b66eb15d1e
file-debuginfo-4.17-28.s390x.rpm     MD5: 4c376921ced154c16806f347b934e9f5
SHA-256: 52c2a894b362afb0cb1b531e6d9f3fa7e6daf8639b33470e65d812104fa099ad
 
x86_64:
file-4.17-28.x86_64.rpm     MD5: 18e0d4f42b48f6e8b7b6a9c1705fa258
SHA-256: cfa4a047fce598cffec24aba38ce473d4c1e5b6853089281378b5aaf1c423f2d
file-debuginfo-4.17-28.x86_64.rpm     MD5: b861558448654fb6f0762ece396961da
SHA-256: 4b61595575a2c93d84f355f3699243b5ad49b63700edd7fe9ac66ad5645d4bf0
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
file-4.17-28.src.rpm     MD5: 41c8c3b29b1407948b08b770ac8f13b3
SHA-256: 675ce8e76d05bcf4c70fb50fcea0ca837d00be0aff4fbf33f7ce0f43a5481499
 
IA-32:
file-4.17-28.i386.rpm     MD5: c5980e6964711a25bdf4bc6e92354552
SHA-256: 30474fa6a4f8aacd722d3047c56b07235b4fae5bdd951c28dd5e838e7821e1b1
file-debuginfo-4.17-28.i386.rpm     MD5: 8ce78f34cb8da8fb7766a716e551d0a0
SHA-256: c7a803b916945efed588391d6e06259ae9b4c47ab71d5caeaa42566b8d700104
 
x86_64:
file-4.17-28.x86_64.rpm     MD5: 18e0d4f42b48f6e8b7b6a9c1705fa258
SHA-256: cfa4a047fce598cffec24aba38ce473d4c1e5b6853089281378b5aaf1c423f2d
file-debuginfo-4.17-28.x86_64.rpm     MD5: b861558448654fb6f0762ece396961da
SHA-256: 4b61595575a2c93d84f355f3699243b5ad49b63700edd7fe9ac66ad5645d4bf0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

758105 - file is not able to detect swap signature on ia64
758631 - file command can't identify the zip64 format correctly.
758634 - file doesn't recognize webm content
826901 - A Korean text file is classified as a DOS executable file


Keywords

file, lzma, swap, webm, zip


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/