I tested 3.2.0-87-virtual from precise-proposed on AWS and it fixes the
df issue which we saw in our automated testing
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1465322
Title:
regression: "df: `
We installed the php5 from the PPA above on a test server, and I can
confirm the segfault is no longer triggered by either of the test cases
above, nor by the original code where we saw the error.
test server info:
# uname -a
Linux web-41 2.6.24-10-xen #1 SMP Tue Sep 8 18:30:05 UTC 2009 x86_64 GN
Attached is a reasonably minimal test file. You also need to have the
Document.php file in the same directory:
svn export http://solr-php-
client.googlecode.com/svn/trunk/Apache/Solr/Document.php@22
running test.php is sufficient to cause a segfault.
# php --version
PHP 5.2.4-2ubuntu5.15 with S
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4697
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/776642
Title:
segfaults from 5.2.4-2ubuntu5.15
--
ubuntu-bugs mailing list
Public bug reported:
Binary package hint: php5
After upgrading from 5.2.4-2ubuntu5.14 to 5.2.4-2ubuntu5.15 we are
experiencing a segfault in PHP code that has been running fine for many
months on Ubuntu 8.04.
Looking at the patches added to this release, my initial guess is that
it relates to
Will the basic method of the patch work (just need to find the correct
lines to change), or additional supporting changes in later kernels are
needed too?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/
We began using 8.04 due to the LTS commitment, and before 10.04 was out.
We have several hundred running instances now.
We expect to start moving some instances to 10.04 within a couple
months, but there are issues like PHP version (5.2 vs. 5.3) that
complicate that move and/or require us to build
We've seen the problem most consistently on c1.medium, so I'd suggest
using that as a test bed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/705562
Title:
ami-6836dc01 8.04 32 bit AMI kernel lock b
Thanks - looking forward to being able to test a fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/705562
Title:
ami-6836dc01 8.04 32 bit AMI kernel lock bug
--
ubuntu-bugs mailing list
ubuntu-bu
** Attachment added: "console output"
https://bugs.launchpad.net/bugs/705562/+attachment/1800904/+files/ami-6836dc01-kernel-lock.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/705562
Title:
Public bug reported:
For months we have been working around a bug in ami-6836dc01, but
this seems not to be reported any place. Is this a known issue?
When we use ruby/puppet (from the Canonical repo) on an instance with
this AMI (e.g. a c1.medium) or in some cases when using java
applications
We are also eagerly/urgently anticipating this fix for 8.04. Is there
some other place to track it or any expected release date?
--
Wait for network before downloading ssh credentials or user-data
https://bugs.launchpad.net/bugs/308530
You received this bug notification because you are a member
There is already a backports package that has 0.6:
http://packages.ubuntu.com/hardy-backports/nginx
--
Security fix in recent release 0.6.39/DSA-1884-1
https://bugs.launchpad.net/bugs/430064
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
*** This bug is a security vulnerability ***
Public security bug reported:
Binary package hint: nginx
The release on 2009-09-14 contains a buffer underflow fix. Unpatched
servers may be vulnerable to DoS or arbitrary code execution.
http://nginx.net/CHANGES-0.6
A fix has been applied to Debia
14 matches
Mail list logo