Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Fedora » ioprocess 0.15.1 updates

ioprocess 0.15.1 updates

Resolves: BZ#1287946

  • Vendor: Fedora
  • Vendor ID: FEDORA-2016-d049ad1118
  • Date: May 17, 2016


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2016-d049ad1118
2016-05-16 16:05:11.582104
--------------------------------------------------------------------------------

Name : ioprocess
Product : Fedora 22
Version : 0.15.1
Release : 1.fc22
URL : https://github.com/oVirt/ioprocess
Summary : Slave process to perform risky IO
Description :
Slave process to perform risky IO.

--------------------------------------------------------------------------------
Update Information:

Resolves: BZ#1287946
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1287946 - ioprocess-0.15.0 tarball md5sum changed between -3 and -4
https://bugzilla.redhat.com/show_bug.cgi?id=1287946
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program. Use
su -c 'yum update ioprocess' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
[email protected]
http://lists.fedoraproject.org/admin/lists/package-announ...

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »