For any parties interested in testing, there is now a patch available at
https://bugs.php.net/bug.php?id=68486 which is looking to solve the
segfaults that happen in processing pipelined PHP requests in Apache
2.4.
--
You received this bug notification because you are a member of Ubuntu
Server
For any parties interested in testing, there is now a patch available at
https://bugs.php.net/bug.php?id=68486 which is looking to solve the
segfaults that happen in processing pipelined PHP requests in Apache
2.4.
--
You received this bug notification because you are a member of Ubuntu
Bugs,
We observe regular segfaults on Ubuntu 14.04 LTS with Apache and PHP in
its default packages presenting these backtraces in a Coredump file:
#0 0x7f9911e619ad in zend_stack_push (
stack=stack@entry=0x7f9912627ca0 compiler_globals+608,
element=element@entry=0x7f9912627c78
We observe regular segfaults on Ubuntu 14.04 LTS with Apache and PHP in
its default packages presenting these backtraces in a Coredump file:
#0 0x7f9911e619ad in zend_stack_push (
stack=stack@entry=0x7f9912627ca0 compiler_globals+608,
element=element@entry=0x7f9912627c78
The bug is instantly reproducible on a fresh Ubuntu 14.04.
Install server.
apt-get install apache2 php5 netcat
Setup a small PHP script with output in /var/www/html/
For Example as test.php
?php
echo date('U').PHP_EOL;
?
shutdown Apache service:
apache2ctl stop
Disable opcache with semicolon
The bug is instantly reproducible on a fresh Ubuntu 14.04.
Install server.
apt-get install apache2 php5 netcat
Setup a small PHP script with output in /var/www/html/
For Example as test.php
?php
echo date('U').PHP_EOL;
?
shutdown Apache service:
apache2ctl stop
Disable opcache with semicolon
This is hopefully the proper place for resolution of this bug.
https://bz.apache.org/bugzilla/show_bug.cgi?id=56984
** Bug watch added: bz.apache.org/bugzilla/ #56984
https://bz.apache.org/bugzilla/show_bug.cgi?id=56984
--
You received this bug notification because you are a member of
This is hopefully the proper place for resolution of this bug.
https://bz.apache.org/bugzilla/show_bug.cgi?id=56984
** Bug watch added: bz.apache.org/bugzilla/ #56984
https://bz.apache.org/bugzilla/show_bug.cgi?id=56984
--
You received this bug notification because you are a member of
The root cause of the problem has been determined to lie with the
apache2handler for PHP. It is not sufficiently up to date to function
well with Apache 2.4 receiving pipelined requests. A patch for the most
common setup has been developed, but it has not yet been integrated
upstream.
I have also
The root cause of the problem has been determined to lie with the
apache2handler for PHP. It is not sufficiently up to date to function
well with Apache 2.4 receiving pipelined requests. A patch for the most
common setup has been developed, but it has not yet been integrated
upstream.
I have also
: (unassigned) = Gerrit Venema (gmoniker)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1407990
Title:
apache2.4 mod-php5.5 random segmentation faults in zend_stack_push()
and zend_hash_find()
To manage
: (unassigned) = Gerrit Venema (gmoniker)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1407990
Title:
apache2.4 mod-php5.5 random segmentation faults in zend_stack_push()
and zend_hash_find
Apologies, I didn't realise I was writing in Dutch :-)
The PHP project has released a fix for this problem with my cleanup
patch. It has been released with 5.6.28 and 5.5.24. It is also part of
an Ubuntu security release: http://www.ubuntu.com/usn/usn-2572-1/
--
You received this bug
Apologies, I didn't realise I was writing in Dutch :-)
The PHP project has released a fix for this problem with my cleanup
patch. It has been released with 5.6.28 and 5.5.24. It is also part of
an Ubuntu security release: http://www.ubuntu.com/usn/usn-2572-1/
--
You received this bug
Public bug reported:
If mpm-itk is installed TLS connections will linger for Alert timeout of
10 seconds unless the client closes first.
Problem can be reproduced with PHP (replace url with your own):
php -r '$context=stream_context_create(array("ssl" => array("ciphers" =>
Public bug reported:
On Ubuntu 14.04 we have a working shibboleth configuration, which when
used in Apache gives the SAML 2.0 attributes of the session in server
variables and the REMOTE_USER according to attribute mapping of
shibboleth.
On Ubuntu 16.04 the same configuration is reported as
Turns out it is not a bug, but an artefact of the method of testing.
If you use domain/handlerPrefix/Login to test your setup, the Apache
variables are not set. They are only set when the shib2 module is called
by way of a Require rule, and this does not happen if you have free
access but call
If you want to try (on your own risk) the Disco Dingo version on Bionic
where libxmltooling8 is built against libcurl4, then you can do this:
curl -L
'http://mirrors.kernel.org/ubuntu/pool/universe/x/xml-security-c/libxml-security-c20_2.0.2-3_amd64.deb'
> libxml-security-c20_2.0.2-3_amd64.deb
Encountered this problem while attempting to run a confined snap from a
cronjob.
All that is wrong actually is that the systemd user session has not been
properly setup.
I had to install dbus-user-session and then make sure the
/run/user/../bus was initialized by for example runuser -u user
19 matches
Mail list logo