Skip to main content

EC2/EBS Conditional Failure Patterns (Part 5)

Data strictly extracted from official AWS troubleshooting documentation. Click the symptom below to get the targeted version-specific vulnerability, past incident, or workaround details.

🚨 Step 1: What specific error symptom are you experiencing?

Please click the most accurate description:


Quick Reference Table

#TypeVerbatim SentenceAffected Version or DateStill Relevant?
1vulnerability / backport"A number of previous vulnerabilities in php7.2 have since been patched via backports by AWS, however your particular security software may still flag this version of PHP."php7.2Fully patched via backports
2past-incident / patch (wontfix)"For the Ubuntu 16.04 LTS - Xenial AMI, hibernation is not supported on t3.nano instance types. No patch will be made available because Ubuntu Xenial ended support in April 2021."Ubuntu 16.04 LTS - Xenial AMI on t3.nanoWorkaround still needed (avoid using t3.nano instances for hibernation on this OS)
3workaround"With FreeBSD AMIs, bare metal instances take nearly an hour to boot and I/O to the local NVMe storage does not complete. As a workaround, add the following line to /boot/loader.conf and reboot: hw.nvme.per_cpu_io_queues="0""FreeBSD AMIs (version/date not specified)Workaround still needed
4vulnerability"If you test the domain again on Qualys SSL Labs, you should see that the RC4 vulnerability and other warnings are gone and the summary looks something like the following."Version/date not specifiedFully patched (via manual configuration instructions provided)