Skip to navigation

Bug Fix Advisory gvfs bug fix and enhancement update

Advisory: RHBA-2012:1124-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-07-31
Last updated on: 2013-02-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated gvfs packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 6.

GVFS is the GNOME desktop's virtual file system layer, which allows users to
easily access local and remote data, including via the FTP, SFTP, WebDAV, CIFS
and SMB protocols, among others. GVFS integrates with the GIO (GNOME I/O)
abstraction layer.

This update fixes the following bugs:

* Previously, rules for ignoring mounts were too restrictive. If the user
clicked on an encrypted volume in the Nautilus' sidebar, an error message was
displayed and the volume could not be accessed. The underlying source code now
contains additional checks so that encrypted volumes have proper mounts
associated (if available), and the file system can be browsed as
expected.(BZ#599055)

* Due to a bug in the kernel, a freshly formatted Blu-ray Disk Rewritable
(BD-RE) medium contains a single track with invalid data that covers the whole
medium. This empty track was previously incorrectly detected, causing the drive
to be unusable for certain applications, such as Brasero. This update adds a
workaround to detect the empty track, so that freshly formatted BD-RE media are
properly recognized as blank. (BZ#669526)

* The code of the gvfs-info, gvfs-open, gvfs-cat, gvfs-ls and gvfs-mount
utilities contained hard-coded exit codes. This caused the utilities to always
return zero on exit. The exit codes have been revised so that the mentioned gvfs
utilities now return proper exit codes. (BZ#682799, BZ#746977, BZ#746978,
BZ#749369, BZ#749371, BZ#749372)

* When running gvfs-set-attribute with an invalid command-line argument
specified, the utility terminated unexpectedly with a segmentation fault. The
underlying source code has been modified so that the utility now prints a proper
error message when an invalid argument is specified. (BZ#746905)

* Due to missing object cleanup calls, the gvfsd daemon could use excessive
amount of memory, which caused the system to become unresponsive. Proper object
cleanup calls have been added with this update, which ensures that the memory
consumption is constant and the system does not hang in this scenario.
(BZ#809708)

All users of gvfs are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
gvfs-1.4.3-15.el6.src.rpm     MD5: 9b704e062278bdeaa6b1f556bdf1e24b
SHA-256: e778d526ff15e9a22aaa81f5f8a24c65e381b677354332e506f73d75e8f39ca1
 
IA-32:
gvfs-1.4.3-15.el6.i686.rpm     MD5: 3fc7bd994c991daa215d54bfb0b34d6b
SHA-256: b18ef5bcfe3245dbea16b4c0e84079f3095fc565f3b722cf4659a7cdb4f306a4
gvfs-afc-1.4.3-15.el6.i686.rpm     MD5: 4f40d9c597ec4d04d1107951413cd4c4
SHA-256: e74d6f04599267e9d015bd5cfd887237eb49e5ef597d86123c57edf1b6415238
gvfs-archive-1.4.3-15.el6.i686.rpm     MD5: fe39acb7114201af5471f00fc37f96d4
SHA-256: 4a5790c367ce447d4dfb754368af38342642b584f803dbc698b11222b6af89eb
gvfs-debuginfo-1.4.3-15.el6.i686.rpm     MD5: ad29939abb06be9d8fb97c98b19b7f54
SHA-256: 0e6945cf975dc962630db618b46553d23d3ac25577e09e6bed66693c8d364ba3
gvfs-devel-1.4.3-15.el6.i686.rpm     MD5: ba67556403792e2969fb932679dadc18
SHA-256: 69c26bfcbf52272a9ac28d715d58315d1b479f1745ea2f6fc02880fc688ee8ad
gvfs-fuse-1.4.3-15.el6.i686.rpm     MD5: 5b52b2c191d498472eaba0586c9ef490
SHA-256: 07bd438d396f39fc74cb82254e5dac1b35a48c9f73be194b98228f62a36475c8
gvfs-gphoto2-1.4.3-15.el6.i686.rpm     MD5: 4d890311e21b5c35890468e02588da89
SHA-256: cd11565dad1e33296d6a6db82e821103cbeeeaf436e9c47c5b4f929b976850d5
gvfs-obexftp-1.4.3-15.el6.i686.rpm     MD5: 8c6962c86be50bcf33bdc83e4d897600
SHA-256: d4cf2ffef32561e6cc5cff15ef63ee5138268a039ce133f80010205f8e4941ef
gvfs-smb-1.4.3-15.el6.i686.rpm     MD5: 2682e489c8e3c9d1194fcba21ddb6313
SHA-256: bbdaa3a9b8572446cc184ec28f2b1e5b8aa4f82594068a86ba01d47a3788557c
 
x86_64:
gvfs-1.4.3-15.el6.i686.rpm     MD5: 3fc7bd994c991daa215d54bfb0b34d6b
SHA-256: b18ef5bcfe3245dbea16b4c0e84079f3095fc565f3b722cf4659a7cdb4f306a4
gvfs-1.4.3-15.el6.x86_64.rpm     MD5: c2cad4d95d5932d42052baa932b49005
SHA-256: 6a7286c5c64a63c697ce7c7c55284d2c2827b0616287dd1b2383ee6deaae51f3
gvfs-afc-1.4.3-15.el6.x86_64.rpm     MD5: e381044fc7b5ab3d0867fdbefd3bb0bc
SHA-256: 20f549ef514212d1e86f1cd791536f161f48831148f5be966dd122a8de67a6ff
gvfs-archive-1.4.3-15.el6.x86_64.rpm     MD5: 4ec4f3bae8f6b2f74b6163b0dfe5d5aa
SHA-256: dcd3028d17c612f26f7f6692e2da4df1c64d8d40395bf0c35c31cc684d342a0f
gvfs-debuginfo-1.4.3-15.el6.i686.rpm     MD5: ad29939abb06be9d8fb97c98b19b7f54
SHA-256: 0e6945cf975dc962630db618b46553d23d3ac25577e09e6bed66693c8d364ba3
gvfs-debuginfo-1.4.3-15.el6.x86_64.rpm     MD5: 2badb721ed780d1c2a4ea1d829a6a2dd
SHA-256: 439ad74f41df37dfa58b3a7db8e00bd8dad93155aedd0ae4ef4eb009f9f65c2b
gvfs-devel-1.4.3-15.el6.i686.rpm     MD5: ba67556403792e2969fb932679dadc18
SHA-256: 69c26bfcbf52272a9ac28d715d58315d1b479f1745ea2f6fc02880fc688ee8ad
gvfs-devel-1.4.3-15.el6.x86_64.rpm     MD5: 0a8d708f4358d3448303103d69ed81b7
SHA-256: 78b97bafaf0ab7296c3f407d9e30aeb758f5533a90f7efe0e4233f2f45cd5a4e
gvfs-fuse-1.4.3-15.el6.x86_64.rpm     MD5: a325b16010a322e929c3b865cd2fd0be
SHA-256: 70a0a1f69976bd4d0ca261ed8f3c9887b6dd3b4527bc6d10b110f0aca7752f49
gvfs-gphoto2-1.4.3-15.el6.x86_64.rpm     MD5: ef07738233d5c1b46eda6352dd757fb0
SHA-256: 2b46da0f6be4012114c32379641ec6b3ea3435d75adb726e52187c8fb0ba72c9
gvfs-obexftp-1.4.3-15.el6.x86_64.rpm     MD5: a086b00b46cc900e1c4e30e8aa5daa7e
SHA-256: 0b91a0e61294adb013080f298d8c08859e6ff191aedb1e039dcc7c60183d1d96
gvfs-smb-1.4.3-15.el6.x86_64.rpm     MD5: 7abda043e37d57a3ee2e7998dc891132
SHA-256: a56cea8b23ed4774ad98925b9202070d58823accdbb68165a1db4434f3db15da
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
gvfs-1.4.3-15.el6.src.rpm     MD5: 9b704e062278bdeaa6b1f556bdf1e24b
SHA-256: e778d526ff15e9a22aaa81f5f8a24c65e381b677354332e506f73d75e8f39ca1
 
x86_64:
gvfs-1.4.3-15.el6.i686.rpm     MD5: 3fc7bd994c991daa215d54bfb0b34d6b
SHA-256: b18ef5bcfe3245dbea16b4c0e84079f3095fc565f3b722cf4659a7cdb4f306a4
gvfs-1.4.3-15.el6.x86_64.rpm     MD5: c2cad4d95d5932d42052baa932b49005
SHA-256: 6a7286c5c64a63c697ce7c7c55284d2c2827b0616287dd1b2383ee6deaae51f3
gvfs-afc-1.4.3-15.el6.x86_64.rpm     MD5: e381044fc7b5ab3d0867fdbefd3bb0bc
SHA-256: 20f549ef514212d1e86f1cd791536f161f48831148f5be966dd122a8de67a6ff
gvfs-archive-1.4.3-15.el6.x86_64.rpm     MD5: 4ec4f3bae8f6b2f74b6163b0dfe5d5aa
SHA-256: dcd3028d17c612f26f7f6692e2da4df1c64d8d40395bf0c35c31cc684d342a0f
gvfs-debuginfo-1.4.3-15.el6.i686.rpm     MD5: ad29939abb06be9d8fb97c98b19b7f54
SHA-256: 0e6945cf975dc962630db618b46553d23d3ac25577e09e6bed66693c8d364ba3
gvfs-debuginfo-1.4.3-15.el6.x86_64.rpm     MD5: 2badb721ed780d1c2a4ea1d829a6a2dd
SHA-256: 439ad74f41df37dfa58b3a7db8e00bd8dad93155aedd0ae4ef4eb009f9f65c2b
gvfs-devel-1.4.3-15.el6.i686.rpm     MD5: ba67556403792e2969fb932679dadc18
SHA-256: 69c26bfcbf52272a9ac28d715d58315d1b479f1745ea2f6fc02880fc688ee8ad
gvfs-devel-1.4.3-15.el6.x86_64.rpm     MD5: 0a8d708f4358d3448303103d69ed81b7
SHA-256: 78b97bafaf0ab7296c3f407d9e30aeb758f5533a90f7efe0e4233f2f45cd5a4e
gvfs-fuse-1.4.3-15.el6.x86_64.rpm     MD5: a325b16010a322e929c3b865cd2fd0be
SHA-256: 70a0a1f69976bd4d0ca261ed8f3c9887b6dd3b4527bc6d10b110f0aca7752f49
gvfs-gphoto2-1.4.3-15.el6.x86_64.rpm     MD5: ef07738233d5c1b46eda6352dd757fb0
SHA-256: 2b46da0f6be4012114c32379641ec6b3ea3435d75adb726e52187c8fb0ba72c9
gvfs-obexftp-1.4.3-15.el6.x86_64.rpm     MD5: a086b00b46cc900e1c4e30e8aa5daa7e
SHA-256: 0b91a0e61294adb013080f298d8c08859e6ff191aedb1e039dcc7c60183d1d96
gvfs-smb-1.4.3-15.el6.x86_64.rpm     MD5: 7abda043e37d57a3ee2e7998dc891132
SHA-256: a56cea8b23ed4774ad98925b9202070d58823accdbb68165a1db4434f3db15da
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
gvfs-1.4.3-15.el6.src.rpm     MD5: 9b704e062278bdeaa6b1f556bdf1e24b
SHA-256: e778d526ff15e9a22aaa81f5f8a24c65e381b677354332e506f73d75e8f39ca1
 
IA-32:
gvfs-1.4.3-15.el6.i686.rpm     MD5: 3fc7bd994c991daa215d54bfb0b34d6b
SHA-256: b18ef5bcfe3245dbea16b4c0e84079f3095fc565f3b722cf4659a7cdb4f306a4
gvfs-afc-1.4.3-15.el6.i686.rpm     MD5: 4f40d9c597ec4d04d1107951413cd4c4
SHA-256: e74d6f04599267e9d015bd5cfd887237eb49e5ef597d86123c57edf1b6415238
gvfs-archive-1.4.3-15.el6.i686.rpm     MD5: fe39acb7114201af5471f00fc37f96d4
SHA-256: 4a5790c367ce447d4dfb754368af38342642b584f803dbc698b11222b6af89eb
gvfs-debuginfo-1.4.3-15.el6.i686.rpm     MD5: ad29939abb06be9d8fb97c98b19b7f54
SHA-256: 0e6945cf975dc962630db618b46553d23d3ac25577e09e6bed66693c8d364ba3
gvfs-devel-1.4.3-15.el6.i686.rpm     MD5: ba67556403792e2969fb932679dadc18
SHA-256: 69c26bfcbf52272a9ac28d715d58315d1b479f1745ea2f6fc02880fc688ee8ad
gvfs-fuse-1.4.3-15.el6.i686.rpm     MD5: 5b52b2c191d498472eaba0586c9ef490
SHA-256: 07bd438d396f39fc74cb82254e5dac1b35a48c9f73be194b98228f62a36475c8
gvfs-gphoto2-1.4.3-15.el6.i686.rpm     MD5: 4d890311e21b5c35890468e02588da89
SHA-256: cd11565dad1e33296d6a6db82e821103cbeeeaf436e9c47c5b4f929b976850d5
gvfs-obexftp-1.4.3-15.el6.i686.rpm     MD5: 8c6962c86be50bcf33bdc83e4d897600
SHA-256: d4cf2ffef32561e6cc5cff15ef63ee5138268a039ce133f80010205f8e4941ef
gvfs-smb-1.4.3-15.el6.i686.rpm     MD5: 2682e489c8e3c9d1194fcba21ddb6313
SHA-256: bbdaa3a9b8572446cc184ec28f2b1e5b8aa4f82594068a86ba01d47a3788557c
 
PPC:
gvfs-1.4.3-15.el6.ppc.rpm     MD5: 92d68cad68dd53adab5a0a611358aa0e
SHA-256: e8a461784c3e6527221525b654549da84f66772f9d9fc01ea14a7b01b26b5e77
gvfs-1.4.3-15.el6.ppc64.rpm     MD5: 07bf51ce159d7363a7e00eea57debfb9
SHA-256: 8d4e21e666bad56d74bfa1876e20692d606039d2bda99fd67ce2709cd3a5a938
gvfs-afc-1.4.3-15.el6.ppc64.rpm     MD5: 4f0877077f800a054e98731902365eb2
SHA-256: 01ce9f52445ed865b92a5976b2d3a1049ea1ae7087c319bed1635bcd3d247510
gvfs-archive-1.4.3-15.el6.ppc64.rpm     MD5: 0b0630da080a504896556c379f383e34
SHA-256: 48e8c1945f5606004536e008f2dd07f6cc78af8abbacdc0ec7795fb2a1820212
gvfs-debuginfo-1.4.3-15.el6.ppc.rpm     MD5: b7be45c07da07c6d404a3c40139d471b
SHA-256: 4b3b3b0ffe69a3fb13db70c63fc7925f61020b7a82ff05aadab5b14754a8d3ce
gvfs-debuginfo-1.4.3-15.el6.ppc64.rpm     MD5: 6df4bbc24fa2fca7dffbcf1181343587
SHA-256: dd3fe019e0bb8e9f91efcffa2372abd4cafdf7b2b1aa6feae93b58b7980e788a
gvfs-devel-1.4.3-15.el6.ppc.rpm     MD5: 608d83cdc7f5acb8629b49c989fa828b
SHA-256: e6cd9d43c92aff6368842a97bec43b95b8df0296aa7f07faa8c4c07e3b4892bd
gvfs-devel-1.4.3-15.el6.ppc64.rpm     MD5: dedbff0aeeb8419a30bce968fe9b3568
SHA-256: 7f64b9dea89d5e6e22d6558d178e9dbd3f489146951d25c90db7327ded4a01f8
gvfs-fuse-1.4.3-15.el6.ppc64.rpm     MD5: 17166e52b0a14587af2cd514f18ec756
SHA-256: 79c5be1d73599acbb12b04181f7eab672777a9db655a91611b4db9c9bcdfbb1d
gvfs-gphoto2-1.4.3-15.el6.ppc64.rpm     MD5: 922f6a17c9f431889668bbe156a425a3
SHA-256: f0ca8540fc846341fee5b2f95bb85feaa37ae1d5d31fd6833b9ff3eaf36ac4b3
gvfs-obexftp-1.4.3-15.el6.ppc64.rpm     MD5: f715020fe8c5cb35c78bd10a97679b66
SHA-256: 3993faae0286c015119b4ed1942dec95295d61c08b95f221d71057860bd7a985
gvfs-smb-1.4.3-15.el6.ppc64.rpm     MD5: fceb0699145a81760cefcedb7f9b098e
SHA-256: 19fe423f0bba8128daaebe03fd88be173fd87b9bded18b4454ee9cdd6587e997
 
s390x:
gvfs-1.4.3-15.el6.s390.rpm     MD5: 2453a4e73baa506002ecb862e18ca2da
SHA-256: f8878b3675d1914787b20aa92d224d973196888f1484c3ce3d161ca5683485ce
gvfs-1.4.3-15.el6.s390x.rpm     MD5: e56fa4fc00f995b9f7f0764bfe2b92c0
SHA-256: 6e60a6c8be2ba1e0137883aebf91ac7e4de69d1d19917ef9286868a29a0167e4
gvfs-archive-1.4.3-15.el6.s390x.rpm     MD5: 736e568cb55c252d6c465917b8d1dcf5
SHA-256: d073661dfb7d26ef60c46a6c3f278a92bbecd49454ed2002b3a5a5dfd038aa5f
gvfs-debuginfo-1.4.3-15.el6.s390.rpm     MD5: 1480135ffba31fed35b91c2ab2cb9e48
SHA-256: 8ae2542fb2f421ad16b6416c4decb9c954f49faaf2d238e0671f44f39eb87bdf
gvfs-debuginfo-1.4.3-15.el6.s390x.rpm     MD5: a1ec9ad60cdf7c2cf888e89d02ddfbb0
SHA-256: 3b31b5f2b44d69c2fb3a306583e9370a93ae4818ffcd00209259e67c9258b1b8
gvfs-devel-1.4.3-15.el6.s390.rpm     MD5: efd5a53d851d1133792f67c0d53852fc
SHA-256: 4af6703de737dae72e9af0e3080888469c7fca22380f412735a3c790a57b2434
gvfs-devel-1.4.3-15.el6.s390x.rpm     MD5: 2ef1a4ec0d7357b1b7b0cbbfaeb53ddd
SHA-256: 0827b94c7e57e97bb7fa3c307883d59a533a31e182921dd5e4e8ad4898f4053e
gvfs-fuse-1.4.3-15.el6.s390x.rpm     MD5: 916506a5b9a78d9237f5e56a5d1db8e1
SHA-256: ee2da3d5ad6e81a23361b8200d0fc714c22073dab34429c9719491011cb43170
gvfs-gphoto2-1.4.3-15.el6.s390x.rpm     MD5: 95ff03ae3c306bb1065b40c874dbabc4
SHA-256: 82a66381dc8055518b9978518a8733b067e9cd8d4a1a86d8047ce987a3bdad08
gvfs-smb-1.4.3-15.el6.s390x.rpm     MD5: 1009c1b2550c993927f156edea1cecc5
SHA-256: 3a195dea071f2022c5f3e4a2ad51ed66709c6275e70514f132e9305896524434
 
x86_64:
gvfs-1.4.3-15.el6.i686.rpm     MD5: 3fc7bd994c991daa215d54bfb0b34d6b
SHA-256: b18ef5bcfe3245dbea16b4c0e84079f3095fc565f3b722cf4659a7cdb4f306a4
gvfs-1.4.3-15.el6.x86_64.rpm     MD5: c2cad4d95d5932d42052baa932b49005
SHA-256: 6a7286c5c64a63c697ce7c7c55284d2c2827b0616287dd1b2383ee6deaae51f3
gvfs-afc-1.4.3-15.el6.x86_64.rpm     MD5: e381044fc7b5ab3d0867fdbefd3bb0bc
SHA-256: 20f549ef514212d1e86f1cd791536f161f48831148f5be966dd122a8de67a6ff
gvfs-archive-1.4.3-15.el6.x86_64.rpm     MD5: 4ec4f3bae8f6b2f74b6163b0dfe5d5aa
SHA-256: dcd3028d17c612f26f7f6692e2da4df1c64d8d40395bf0c35c31cc684d342a0f
gvfs-debuginfo-1.4.3-15.el6.i686.rpm     MD5: ad29939abb06be9d8fb97c98b19b7f54
SHA-256: 0e6945cf975dc962630db618b46553d23d3ac25577e09e6bed66693c8d364ba3
gvfs-debuginfo-1.4.3-15.el6.x86_64.rpm     MD5: 2badb721ed780d1c2a4ea1d829a6a2dd
SHA-256: 439ad74f41df37dfa58b3a7db8e00bd8dad93155aedd0ae4ef4eb009f9f65c2b
gvfs-devel-1.4.3-15.el6.i686.rpm     MD5: ba67556403792e2969fb932679dadc18
SHA-256: 69c26bfcbf52272a9ac28d715d58315d1b479f1745ea2f6fc02880fc688ee8ad
gvfs-devel-1.4.3-15.el6.x86_64.rpm     MD5: 0a8d708f4358d3448303103d69ed81b7
SHA-256: 78b97bafaf0ab7296c3f407d9e30aeb758f5533a90f7efe0e4233f2f45cd5a4e
gvfs-fuse-1.4.3-15.el6.x86_64.rpm     MD5: a325b16010a322e929c3b865cd2fd0be
SHA-256: 70a0a1f69976bd4d0ca261ed8f3c9887b6dd3b4527bc6d10b110f0aca7752f49
gvfs-gphoto2-1.4.3-15.el6.x86_64.rpm     MD5: ef07738233d5c1b46eda6352dd757fb0
SHA-256: 2b46da0f6be4012114c32379641ec6b3ea3435d75adb726e52187c8fb0ba72c9
gvfs-obexftp-1.4.3-15.el6.x86_64.rpm     MD5: a086b00b46cc900e1c4e30e8aa5daa7e
SHA-256: 0b91a0e61294adb013080f298d8c08859e6ff191aedb1e039dcc7c60183d1d96
gvfs-smb-1.4.3-15.el6.x86_64.rpm     MD5: 7abda043e37d57a3ee2e7998dc891132
SHA-256: a56cea8b23ed4774ad98925b9202070d58823accdbb68165a1db4434f3db15da
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
gvfs-1.4.3-15.el6.src.rpm     MD5: 9b704e062278bdeaa6b1f556bdf1e24b
SHA-256: e778d526ff15e9a22aaa81f5f8a24c65e381b677354332e506f73d75e8f39ca1
 
IA-32:
gvfs-1.4.3-15.el6.i686.rpm     MD5: 3fc7bd994c991daa215d54bfb0b34d6b
SHA-256: b18ef5bcfe3245dbea16b4c0e84079f3095fc565f3b722cf4659a7cdb4f306a4
gvfs-afc-1.4.3-15.el6.i686.rpm     MD5: 4f40d9c597ec4d04d1107951413cd4c4
SHA-256: e74d6f04599267e9d015bd5cfd887237eb49e5ef597d86123c57edf1b6415238
gvfs-archive-1.4.3-15.el6.i686.rpm     MD5: fe39acb7114201af5471f00fc37f96d4
SHA-256: 4a5790c367ce447d4dfb754368af38342642b584f803dbc698b11222b6af89eb
gvfs-debuginfo-1.4.3-15.el6.i686.rpm     MD5: ad29939abb06be9d8fb97c98b19b7f54
SHA-256: 0e6945cf975dc962630db618b46553d23d3ac25577e09e6bed66693c8d364ba3
gvfs-devel-1.4.3-15.el6.i686.rpm     MD5: ba67556403792e2969fb932679dadc18
SHA-256: 69c26bfcbf52272a9ac28d715d58315d1b479f1745ea2f6fc02880fc688ee8ad
gvfs-fuse-1.4.3-15.el6.i686.rpm     MD5: 5b52b2c191d498472eaba0586c9ef490
SHA-256: 07bd438d396f39fc74cb82254e5dac1b35a48c9f73be194b98228f62a36475c8
gvfs-gphoto2-1.4.3-15.el6.i686.rpm     MD5: 4d890311e21b5c35890468e02588da89
SHA-256: cd11565dad1e33296d6a6db82e821103cbeeeaf436e9c47c5b4f929b976850d5
gvfs-obexftp-1.4.3-15.el6.i686.rpm     MD5: 8c6962c86be50bcf33bdc83e4d897600
SHA-256: d4cf2ffef32561e6cc5cff15ef63ee5138268a039ce133f80010205f8e4941ef
gvfs-smb-1.4.3-15.el6.i686.rpm     MD5: 2682e489c8e3c9d1194fcba21ddb6313
SHA-256: bbdaa3a9b8572446cc184ec28f2b1e5b8aa4f82594068a86ba01d47a3788557c
 
x86_64:
gvfs-1.4.3-15.el6.i686.rpm     MD5: 3fc7bd994c991daa215d54bfb0b34d6b
SHA-256: b18ef5bcfe3245dbea16b4c0e84079f3095fc565f3b722cf4659a7cdb4f306a4
gvfs-1.4.3-15.el6.x86_64.rpm     MD5: c2cad4d95d5932d42052baa932b49005
SHA-256: 6a7286c5c64a63c697ce7c7c55284d2c2827b0616287dd1b2383ee6deaae51f3
gvfs-afc-1.4.3-15.el6.x86_64.rpm     MD5: e381044fc7b5ab3d0867fdbefd3bb0bc
SHA-256: 20f549ef514212d1e86f1cd791536f161f48831148f5be966dd122a8de67a6ff
gvfs-archive-1.4.3-15.el6.x86_64.rpm     MD5: 4ec4f3bae8f6b2f74b6163b0dfe5d5aa
SHA-256: dcd3028d17c612f26f7f6692e2da4df1c64d8d40395bf0c35c31cc684d342a0f
gvfs-debuginfo-1.4.3-15.el6.i686.rpm     MD5: ad29939abb06be9d8fb97c98b19b7f54
SHA-256: 0e6945cf975dc962630db618b46553d23d3ac25577e09e6bed66693c8d364ba3
gvfs-debuginfo-1.4.3-15.el6.x86_64.rpm     MD5: 2badb721ed780d1c2a4ea1d829a6a2dd
SHA-256: 439ad74f41df37dfa58b3a7db8e00bd8dad93155aedd0ae4ef4eb009f9f65c2b
gvfs-devel-1.4.3-15.el6.i686.rpm     MD5: ba67556403792e2969fb932679dadc18
SHA-256: 69c26bfcbf52272a9ac28d715d58315d1b479f1745ea2f6fc02880fc688ee8ad
gvfs-devel-1.4.3-15.el6.x86_64.rpm     MD5: 0a8d708f4358d3448303103d69ed81b7
SHA-256: 78b97bafaf0ab7296c3f407d9e30aeb758f5533a90f7efe0e4233f2f45cd5a4e
gvfs-fuse-1.4.3-15.el6.x86_64.rpm     MD5: a325b16010a322e929c3b865cd2fd0be
SHA-256: 70a0a1f69976bd4d0ca261ed8f3c9887b6dd3b4527bc6d10b110f0aca7752f49
gvfs-gphoto2-1.4.3-15.el6.x86_64.rpm     MD5: ef07738233d5c1b46eda6352dd757fb0
SHA-256: 2b46da0f6be4012114c32379641ec6b3ea3435d75adb726e52187c8fb0ba72c9
gvfs-obexftp-1.4.3-15.el6.x86_64.rpm     MD5: a086b00b46cc900e1c4e30e8aa5daa7e
SHA-256: 0b91a0e61294adb013080f298d8c08859e6ff191aedb1e039dcc7c60183d1d96
gvfs-smb-1.4.3-15.el6.x86_64.rpm     MD5: 7abda043e37d57a3ee2e7998dc891132
SHA-256: a56cea8b23ed4774ad98925b9202070d58823accdbb68165a1db4434f3db15da
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

746977 - wrong exit code gvfs-info
746978 - wrong exit code gvfs-open
749369 - wrong exit code gvfs-cat
749371 - wrong exit code gvfs-ls
749372 - wrong exit code gvfs-mount


Keywords

gvfs


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/