[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: [rhelv5-list] rhn_check/rhnsd memory leak



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Stainforth, Matthew (SD/DS) wrote:
> Just wondering if anyone else has been bitten by this bug:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=566746
> 
> I ran into it while running RHEL 5.5 upgrade tests via RHN push.  Systems with less than 8GB of memory go OOM due to rhn_check leakage.
> 
> Apparently the only ETA is "some time before the next minor revision".   It's a show stopper for our 5.5 upgrade plans for now.
> 
> Just curious if anyone else has run into the same problem.
> 
> Matt Stainforth
> Technical Analyst | Analyste Technique
> Social Development | Développement social
> 
> 
> 
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> rhelv5-list mailing list
> rhelv5-list redhat com
> https://www.redhat.com/mailman/listinfo/rhelv5-list

Please open an ticket with support.  Issues that impact more customers
usually get higher priority and will ultimately be fixed faster.  Please
reference this bug so an Issue Tracker will be associated with this bug.

Thanks,
Brandon
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with Red Hat - http://enigmail.mozdev.org/

iD8DBQFLzGTThwQhj8l1t/cRAmCZAJ0TqZE2OsPJXiB5WKxQbUISyYtXSwCdFeBv
dNIntT3OgvAr4GreTnUsh5Q=
=xSQ3
-----END PGP SIGNATURE-----


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]