[Bug 1465322] Re: regression: df: `/sys/kernel/debug': Function not implemented with 3.2.0-85.122
I tested 3.2.0-87-virtual from precise-proposed on AWS and it fixes the df issue which we saw in our automated testing -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1465322 Title: regression: df: `/sys/kernel/debug': Function not implemented with 3.2.0-85.122 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1465322/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 776642] Re: segfaults from 5.2.4-2ubuntu5.15
We installed the php5 from the PPA above on a test server, and I can confirm the segfault is no longer triggered by either of the test cases above, nor by the original code where we saw the error. test server info: # uname -a Linux web-41 2.6.24-10-xen #1 SMP Tue Sep 8 18:30:05 UTC 2009 x86_64 GNU/Linux # php -v PHP 5.2.4-2ubuntu5.17~lp776642 with Suhosin-Patch 0.9.6.2 (cli) (built: May 4 2011 09:21:29) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/776642 Title: segfaults from 5.2.4-2ubuntu5.15 -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 776642] Re: segfaults from 5.2.4-2ubuntu5.15
We installed the php5 from the PPA above on a test server, and I can confirm the segfault is no longer triggered by either of the test cases above, nor by the original code where we saw the error. test server info: # uname -a Linux web-41 2.6.24-10-xen #1 SMP Tue Sep 8 18:30:05 UTC 2009 x86_64 GNU/Linux # php -v PHP 5.2.4-2ubuntu5.17~lp776642 with Suhosin-Patch 0.9.6.2 (cli) (built: May 4 2011 09:21:29) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/776642 Title: segfaults from 5.2.4-2ubuntu5.15 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 776642] [NEW] segfaults from 5.2.4-2ubuntu5.15
Public bug reported: Binary package hint: php5 After upgrading from 5.2.4-2ubuntu5.14 to 5.2.4-2ubuntu5.15 we are experiencing a segfault in PHP code that has been running fine for many months on Ubuntu 8.04. Looking at the patches added to this release, my initial guess is that it relates to the backport of this fix: http://bugs.php.net/52879 The segfault occurs in this code: http://drupalcode.org/project/apachesolr.git/blob/c41231e49f06ab32bb48f34c4a4dc0f21162321d:/apachesolr.index.inc at line 150's function call. The two adjacent function signatures are very similar: function apachesolr_add_tags_to_document($document, $text) { function apachesolr_add_taxonomy_to_document($document, $node) { However, if I remove the from the 2nd one, the segfault goes away: function apachesolr_add_taxonomy_to_document($document, $node) { The class of the $document object is this: http://code.google.com/p/solr-php- client/source/browse/trunk/Apache/Solr/Document.php?r=15 And you'll note that it implements __get(), __set(), __isset(), and __unset() ** Affects: php5 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/776642 Title: segfaults from 5.2.4-2ubuntu5.15 -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 776642] Re: segfaults from 5.2.4-2ubuntu5.15
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4697 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/776642 Title: segfaults from 5.2.4-2ubuntu5.15 -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 776642] Re: segfaults from 5.2.4-2ubuntu5.15
Attached is a reasonably minimal test file. You also need to have the Document.php file in the same directory: svn export http://solr-php- client.googlecode.com/svn/trunk/Apache/Solr/Document.php@22 running test.php is sufficient to cause a segfault. # php --version PHP 5.2.4-2ubuntu5.15 with Suhosin-Patch 0.9.6.2 (cli) (built: Apr 28 2011 14:41:00) Copyright (c) 1997-2007 The PHP Group Zend Engine v2.2.0, Copyright (c) 1998-2007 Zend Technologies # php test.php Segmentation fault # tail /var/log/syslog: 2011-05-03T19:43:55+00:00 kern.info web-50 kernel: [49000.621496] php[13034]: segfault at 29c200e1 rip 675326 rsp 7fff0ad7c9a0 error 4 ** Attachment added: PHP file to demonstrate the bug https://bugs.launchpad.net/ubuntu/+source/php5/+bug/776642/+attachment/2110223/+files/test.php -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/776642 Title: segfaults from 5.2.4-2ubuntu5.15 -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 776642] [NEW] segfaults from 5.2.4-2ubuntu5.15
Public bug reported: Binary package hint: php5 After upgrading from 5.2.4-2ubuntu5.14 to 5.2.4-2ubuntu5.15 we are experiencing a segfault in PHP code that has been running fine for many months on Ubuntu 8.04. Looking at the patches added to this release, my initial guess is that it relates to the backport of this fix: http://bugs.php.net/52879 The segfault occurs in this code: http://drupalcode.org/project/apachesolr.git/blob/c41231e49f06ab32bb48f34c4a4dc0f21162321d:/apachesolr.index.inc at line 150's function call. The two adjacent function signatures are very similar: function apachesolr_add_tags_to_document($document, $text) { function apachesolr_add_taxonomy_to_document($document, $node) { However, if I remove the from the 2nd one, the segfault goes away: function apachesolr_add_taxonomy_to_document($document, $node) { The class of the $document object is this: http://code.google.com/p/solr-php- client/source/browse/trunk/Apache/Solr/Document.php?r=15 And you'll note that it implements __get(), __set(), __isset(), and __unset() ** Affects: php5 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/776642 Title: segfaults from 5.2.4-2ubuntu5.15 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 776642] Re: segfaults from 5.2.4-2ubuntu5.15
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4697 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/776642 Title: segfaults from 5.2.4-2ubuntu5.15 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 776642] Re: segfaults from 5.2.4-2ubuntu5.15
Attached is a reasonably minimal test file. You also need to have the Document.php file in the same directory: svn export http://solr-php- client.googlecode.com/svn/trunk/Apache/Solr/Document.php@22 running test.php is sufficient to cause a segfault. # php --version PHP 5.2.4-2ubuntu5.15 with Suhosin-Patch 0.9.6.2 (cli) (built: Apr 28 2011 14:41:00) Copyright (c) 1997-2007 The PHP Group Zend Engine v2.2.0, Copyright (c) 1998-2007 Zend Technologies # php test.php Segmentation fault # tail /var/log/syslog: 2011-05-03T19:43:55+00:00 kern.info web-50 kernel: [49000.621496] php[13034]: segfault at 29c200e1 rip 675326 rsp 7fff0ad7c9a0 error 4 ** Attachment added: PHP file to demonstrate the bug https://bugs.launchpad.net/ubuntu/+source/php5/+bug/776642/+attachment/2110223/+files/test.php -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/776642 Title: segfaults from 5.2.4-2ubuntu5.15 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 705562] Re: ami-6836dc01 8.04 32 bit AMI kernel lock bug
Will the basic method of the patch work (just need to find the correct lines to change), or additional supporting changes in later kernels are needed too? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/705562 Title: ami-6836dc01 8.04 32 bit AMI kernel lock bug -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 705562] Re: ami-6836dc01 8.04 32 bit AMI kernel lock bug
We began using 8.04 due to the LTS commitment, and before 10.04 was out. We have several hundred running instances now. We expect to start moving some instances to 10.04 within a couple months, but there are issues like PHP version (5.2 vs. 5.3) that complicate that move and/or require us to build additional packages. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/705562 Title: ami-6836dc01 8.04 32 bit AMI kernel lock bug -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 705562] Re: ami-6836dc01 8.04 32 bit AMI kernel lock bug
Thanks - looking forward to being able to test a fix. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/705562 Title: ami-6836dc01 8.04 32 bit AMI kernel lock bug -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 705562] Re: ami-6836dc01 8.04 32 bit AMI kernel lock bug
We've seen the problem most consistently on c1.medium, so I'd suggest using that as a test bed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/705562 Title: ami-6836dc01 8.04 32 bit AMI kernel lock bug -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 705562] [NEW] ami-6836dc01 8.04 32 bit AMI kernel lock bug
Public bug reported: For months we have been working around a bug in ami-6836dc01, but this seems not to be reported any place. Is this a known issue? When we use ruby/puppet (from the Canonical repo) on an instance with this AMI (e.g. a c1.medium) or in some cases when using java applications the instance gets locked up. Our work-around is using kernel 2.6.27-22-xen instead - the person who created the fixed AMI used this method: - launch instance of ami-7e28ca17 (instance #1) - modprobe loop on instance #1 - copy up creds, jdk and ec2-ami-tools to /dev/shm on instance #1 - launch instance of ami-69d73000 (canonical-beta-us/ubuntu-intrepid-beta2-20090226-i386.manifest.xml) to grab kernel modules from (instance #2) - tar.gz /lib/modules/2.6.27-22-xen on instance #2 - scp to instance #1 and untar in /lib/modules - rm -rf the old /lib/modules/2.6.24-10-xen dir on instance #1 - edit quick-bundle script on instance #1 to hard-code AKI to aki-20c12649, ARI to ari-21c12648 (the AKI and ARI from instance #2). - hard-coded manifest name, bucket to whatever. - run pre-clean script on instance #1 - run quick-bundle script on instance #1 The console output from a locked instance is attached ** Affects: ubuntu Importance: Undecided Status: New ** Tags: ec2-images -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/705562 Title: ami-6836dc01 8.04 32 bit AMI kernel lock bug -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 705562] Re: ami-6836dc01 8.04 32 bit AMI kernel lock bug
** Attachment added: console output https://bugs.launchpad.net/bugs/705562/+attachment/1800904/+files/ami-6836dc01-kernel-lock.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/705562 Title: ami-6836dc01 8.04 32 bit AMI kernel lock bug -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 308530] Re: Wait for network before downloading ssh credentials or user-data
We are also eagerly/urgently anticipating this fix for 8.04. Is there some other place to track it or any expected release date? -- Wait for network before downloading ssh credentials or user-data https://bugs.launchpad.net/bugs/308530 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 430064] Re: Security fix in recent release 0.6.39/DSA-1884-1
There is already a backports package that has 0.6: http://packages.ubuntu.com/hardy-backports/nginx -- Security fix in recent release 0.6.39/DSA-1884-1 https://bugs.launchpad.net/bugs/430064 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 430064] [NEW] Security fix in recent release 0.6.39/DSA-1884-1
*** This bug is a security vulnerability *** Public security bug reported: Binary package hint: nginx The release on 2009-09-14 contains a buffer underflow fix. Unpatched servers may be vulnerable to DoS or arbitrary code execution. http://nginx.net/CHANGES-0.6 A fix has been applied to Debian packages. please update the Ubuntu packages to the latest code, or backport the fix. - -- Debian Security Advisory DSA-1884-1secur...@debian.org http://www.debian.org/security/ Nico Golde September 14th, 2009http://www.debian.org/security/faq - -- Package: nginx Vulnerability : buffer underflow Problem type : remote Debian-specific: no CVE ID : CVE-2009-2629 Chris Ries discovered that nginx, a high-performance HTTP server, reverse proxy and IMAP/POP3 proxy server, is vulnerable to a buffer underflow when processing certain HTTP requests. An attacker can use this to execute arbitrary code with the rights of the worker process (www-data on Debian) or possibly perform denial of service attacks by repeatedly crashing worker processes via a specially crafted URL in an HTTP request. For the oldstable distribution (etch), this problem has been fixed in version 0.4.13-2+etch2. For the stable distribution (lenny), this problem has been fixed in version 0.6.32-3+lenny2. For the testing distribution (squeeze), this problem will be fixed soon. For the unstable distribution (sid), this problem has been fixed in version 0.7.61-3. ** Affects: nginx (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public -- Security fix in recent release 0.6.39/DSA-1884-1 https://bugs.launchpad.net/bugs/430064 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs