s3fs memory leak using https for AWS bucket

Bug #1802912 reported by Mark Kovach
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
s3fs-fuse (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

When mounting a AWS S3 bucket using https, memory use grows until OOM killer kills process. Please update s3fs package and dependencies to a newer version.

Revision history for this message
Mattia Rizzolo (mapreri) wrote :

Why do you say "Please update s3fs package and dependencies to a newer version." - do you know this particular case is fixed by something? When you wrote this message there wasn't a new upstream release of s3fs.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package s3fs-fuse - 1.85-1

---------------
s3fs-fuse (1.85-1) unstable; urgency=medium

  [ Mattia Rizzolo ]
  * New upstream release 1.85. Closes: #949032; LP: #1828849
    + Plug many memory leaks. LP: #1802912
  * Add patch from upstream to fix cross-compiling. Closes: #923581

  [ Andrii Senkovych ]
  * d/gbp.conf: revert to default upstream tag name format.

  [ Ondřej Nový ]
  * d/copyright: Change Format URL to correct one

  [ Debian Janitor ]
  * Bump debhelper from old 11 to 12.
  * Set debhelper-compat version in Build-Depends.
  * Set upstream metadata fields: Repository, Repository-Browse.

 -- Mattia Rizzolo <email address hidden> Fri, 17 Jan 2020 19:32:06 +0100

Changed in s3fs-fuse (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.