I tested 3.2.0-87-virtual from precise-proposed on AWS and it fixes the
df issue which we saw in our automated testing
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1465322
Title:
regression: df:
We installed the php5 from the PPA above on a test server, and I can
confirm the segfault is no longer triggered by either of the test cases
above, nor by the original code where we saw the error.
test server info:
# uname -a
Linux web-41 2.6.24-10-xen #1 SMP Tue Sep 8 18:30:05 UTC 2009 x86_64
We installed the php5 from the PPA above on a test server, and I can
confirm the segfault is no longer triggered by either of the test cases
above, nor by the original code where we saw the error.
test server info:
# uname -a
Linux web-41 2.6.24-10-xen #1 SMP Tue Sep 8 18:30:05 UTC 2009 x86_64
Public bug reported:
Binary package hint: php5
After upgrading from 5.2.4-2ubuntu5.14 to 5.2.4-2ubuntu5.15 we are
experiencing a segfault in PHP code that has been running fine for many
months on Ubuntu 8.04.
Looking at the patches added to this release, my initial guess is that
it relates to
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4697
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/776642
Title:
segfaults from 5.2.4-2ubuntu5.15
--
Attached is a reasonably minimal test file. You also need to have the
Document.php file in the same directory:
svn export http://solr-php-
client.googlecode.com/svn/trunk/Apache/Solr/Document.php@22
running test.php is sufficient to cause a segfault.
# php --version
PHP 5.2.4-2ubuntu5.15 with
Public bug reported:
Binary package hint: php5
After upgrading from 5.2.4-2ubuntu5.14 to 5.2.4-2ubuntu5.15 we are
experiencing a segfault in PHP code that has been running fine for many
months on Ubuntu 8.04.
Looking at the patches added to this release, my initial guess is that
it relates to
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4697
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/776642
Title:
segfaults from 5.2.4-2ubuntu5.15
--
ubuntu-bugs mailing
Attached is a reasonably minimal test file. You also need to have the
Document.php file in the same directory:
svn export http://solr-php-
client.googlecode.com/svn/trunk/Apache/Solr/Document.php@22
running test.php is sufficient to cause a segfault.
# php --version
PHP 5.2.4-2ubuntu5.15 with
Will the basic method of the patch work (just need to find the correct
lines to change), or additional supporting changes in later kernels are
needed too?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
We began using 8.04 due to the LTS commitment, and before 10.04 was out.
We have several hundred running instances now.
We expect to start moving some instances to 10.04 within a couple
months, but there are issues like PHP version (5.2 vs. 5.3) that
complicate that move and/or require us to
Thanks - looking forward to being able to test a fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/705562
Title:
ami-6836dc01 8.04 32 bit AMI kernel lock bug
--
ubuntu-bugs mailing list
We've seen the problem most consistently on c1.medium, so I'd suggest
using that as a test bed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/705562
Title:
ami-6836dc01 8.04 32 bit AMI kernel lock
Public bug reported:
For months we have been working around a bug in ami-6836dc01, but
this seems not to be reported any place. Is this a known issue?
When we use ruby/puppet (from the Canonical repo) on an instance with
this AMI (e.g. a c1.medium) or in some cases when using java
applications
** Attachment added: console output
https://bugs.launchpad.net/bugs/705562/+attachment/1800904/+files/ami-6836dc01-kernel-lock.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/705562
Title:
We are also eagerly/urgently anticipating this fix for 8.04. Is there
some other place to track it or any expected release date?
--
Wait for network before downloading ssh credentials or user-data
https://bugs.launchpad.net/bugs/308530
You received this bug notification because you are a member
There is already a backports package that has 0.6:
http://packages.ubuntu.com/hardy-backports/nginx
--
Security fix in recent release 0.6.39/DSA-1884-1
https://bugs.launchpad.net/bugs/430064
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
*** This bug is a security vulnerability ***
Public security bug reported:
Binary package hint: nginx
The release on 2009-09-14 contains a buffer underflow fix. Unpatched
servers may be vulnerable to DoS or arbitrary code execution.
http://nginx.net/CHANGES-0.6
A fix has been applied to
18 matches
Mail list logo