--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2013-5804
2013-05-14 16:56:56
--------------------------------------------------------------------------------
Name : curlftpfs
Product : Fedora EPEL 6
Version : 0.9.2
Release : 14.el6
URL :
http://curlftpfs.sourceforge.net/
Summary : CurlFtpFS is a filesystem for accessing FTP hosts based on FUSE and libcurl
Description :
CurlFtpFS is a filesystem for accessing FTP hosts based on FUSE and
libcurl. It features SSL support, connecting through tunneling HTTP
proxies, and automatically reconnecting if the server times out.
--------------------------------------------------------------------------------
Update Information:
Fix IO errors, two memleaks and add aarch64 support
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #962015 - permenently IO-errors
https://bugzilla.redhat.com/show_bug.cgi?id=962015
[ 2 ] Bug #962164 - Curlftpfs duplicate owning files in -debuginfo packages whta lead to
install conflicts
https://bugzilla.redhat.com/show_bug.cgi?id=962164
[ 3 ] Bug #831419 - Plug a memleak with no cache
https://bugzilla.redhat.com/show_bug.cgi?id=831419
[ 4 ] Bug #831418 - Plug a gigantic memleak
https://bugzilla.redhat.com/show_bug.cgi?id=831418
[ 5 ] Bug #925209 - curlftpfs: Does not support aarch64 in f19 and rawhide
https://bugzilla.redhat.com/show_bug.cgi?id=925209
[ 6 ] Bug #962233 - Curlftpfs SCM change request
https://bugzilla.redhat.com/show_bug.cgi?id=962233
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update curlftpfs' at the command line.
For more information, refer to "Managing Software with yum",
available at
http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------