[Bug 1388905] [NEW] planned response to ruby security issues?
Public bug reported: Our OpsWorks team is keen to get insight into how Canonical plans to respond to the recent ruby security issues with regards to 12.04 LTS and 14.04 LTS. https://www.ruby-lang.org/en/news/2014/10/27/changing-default-settings-of-ext-openssl/ https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/ ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1388905 Title: planned response to ruby security issues? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1388905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1377336] Re: deprecating magnetic by default AMIs
** Changed in: linux (Ubuntu) Status: Incomplete => Invalid ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Thor Nolen (tnolen) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1377336 Title: deprecating magnetic by default AMIs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1377336/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1377336] [NEW] deprecating magnetic by default AMIs
Public bug reported: Our EBS team has analyzed the customer behavior associated with the use of the default SSD and default magnetic backed AMIs. Moving forward we only see the SSD backed AMIs as being required. These will still accommodate magnetic backed EBS volume deployments but by default customers have overwhelmingly selected SSD volumes as preference. ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1377336 Title: deprecating magnetic by default AMIs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1377336/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1349883] Re: dmesg time wildly incorrect on paravirtual EC2 instances.
Have we been able to confirm if this is not a reintroduction of or relation to the issue that was resolved in https://bugs.launchpad.net/ubuntu/+source/linux/+bug/727459? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1349883 Title: dmesg time wildly incorrect on paravirtual EC2 instances. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1349883/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1304001] Re: xen:balloon errors in 14.04 beta
http://marc.info/?l=xen-devel&m=135939492007293&w=1 This option is incompatible with PCI hotplug. This is a known problem. We recommend Canonical disable this option as does upstream. From that note: " Inside dom0, yes? Looking at the balloon driver, it doesn't seem to handle dom0 (or domUs with PCI devices passed-through) very well because it doesn't check the memory map before attempting to hotplug additional memory so it ends up overlapping a region that is already reserved. This is is particularly common if you booted Xen with dom0_mem=max:MMM as the host's memory beyond MMM is still in dom0's memory map (marked as UNUSABLE). I suggest disabling CONFIG_XEN_BALLOON_MEMORY_HOTPLUG for now. David Vrabel " -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1304001 Title: xen:balloon errors in 14.04 beta To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1304001/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs