[Bug 1358727] Re: LibNss Bug 962760 affects usability of Chrome
** Bug watch added: Mozilla Bugzilla #962760 https://bugzilla.mozilla.org/show_bug.cgi?id=962760 ** Also affects: nss via https://bugzilla.mozilla.org/show_bug.cgi?id=962760 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nss in Ubuntu. https://bugs.launchpad.net/bugs/1358727 Title: LibNss Bug 962760 affects usability of Chrome To manage notifications about this bug go to: https://bugs.launchpad.net/nss/+bug/1358727/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1002434] Re: TLS interoperability issue in NSS based software
This was fixed in 3.14 release of NSS as shown at https://bugzilla.mozilla.org/buglist.cgi?list_id=4643675;resolution=FIXED;classification=Components;query_format=advanced;product=NSS;target_milestone=3.14 (see bug 636802). All currently supported Ubuntu releases are on 3.15+ so closing as this no longer affects any current Ubuntu versions. ** Changed in: firefox (Ubuntu) Status: Triaged => Fix Released ** Changed in: nss (Ubuntu) Status: Triaged => Fix Released ** Changed in: thunderbird (Ubuntu) Status: Triaged => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nss in Ubuntu. https://bugs.launchpad.net/bugs/1002434 Title: TLS interoperability issue in NSS based software To manage notifications about this bug go to: https://bugs.launchpad.net/nss/+bug/1002434/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1304566] Re: package libapache2-mod-php5 5.5.3+dfsg-1ubuntu2.3 failed to install/upgrade: il sottoprocesso installato script di post-installation ha restituito lo stato di errore 1
Thank you for reporting this bug to Ubuntu. Saucy (13.04) reached EOL on July 17, 2014. See this document for currently supported Ubuntu releases: https://wiki.ubuntu.com/Releases Please upgrade to the latest version and re-test. If the bug is still reproducible, increase the verbosity of the steps to recreate it so we can try again. Do feel free to report any other bugs you may find. ** Changed in: php5 (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1304566 Title: package libapache2-mod-php5 5.5.3+dfsg-1ubuntu2.3 failed to install/upgrade: il sottoprocesso installato script di post- installation ha restituito lo stato di errore 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1304566/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1308059] Re: package php5-cli 5.5.3+dfsg-1ubuntu2.3 failed to install/upgrade: subprocess installed post-installation script returned error exit status 4
Is /etc/php5/cli/php.ini a symlink to another file? If so you are being affected by this bug: https://bugs.debian.org/cgi- bin/bugreport.cgi?bug=718955 ** Bug watch added: Debian Bug tracker #718955 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718955 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1308059 Title: package php5-cli 5.5.3+dfsg-1ubuntu2.3 failed to install/upgrade: subprocess installed post-installation script returned error exit status 4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1308059/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1303943] Re: package php5-common (not installed) failed to install/upgrade: el subproceso instalado el script post-installation devolvió el código de salida de error 10
Thank you for reporting this bug to Ubuntu. Saucy (13.04) reached EOL on July 17, 2014. See this document for currently supported Ubuntu releases: https://wiki.ubuntu.com/Releases Please upgrade to the latest version and re-test. If the bug is still reproducible, increase the verbosity of the steps to recreate it so we can try again. Do feel free to report any other bugs you may find. ** Changed in: php5 (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1303943 Title: package php5-common (not installed) failed to install/upgrade: el subproceso instalado el script post-installation devolvió el código de salida de error 10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1303943/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1304123] Re: package libapache2-mod-php5 5.5.3+dfsg-1ubuntu2.2 failed to install/upgrade: 子进程 已安装 post-installation 脚本 返回了错误号 1
Thank you for reporting this bug to Ubuntu. Saucy (13.04) reached EOL on July 17, 2014. See this document for currently supported Ubuntu releases: https://wiki.ubuntu.com/Releases Please upgrade to the latest version and re-test. If the bug is still reproducible, increase the verbosity of the steps to recreate it so we can try again. Do feel free to report any other bugs you may find. ** Changed in: php5 (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1304123 Title: package libapache2-mod-php5 5.5.3+dfsg-1ubuntu2.2 failed to install/upgrade: 子进程 已安装 post-installation 脚本 返回了错误号 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1304123/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1304565] Re: package php5-gd 5.4.6-1ubuntu1.8 failed to install/upgrade: 子进程 已安装 post-installation 脚本 返回了错误号 2
Thank you for reporting this bug to Ubuntu. Quantal (12.10) reached EOL on May 16, 2014. See this document for currently supported Ubuntu releases: https://wiki.ubuntu.com/Releases Please upgrade to the latest version and re-test. If the bug is still reproducible, increase the verbosity of the steps to recreate it so we can try again. Do feel free to report any other bugs you may find. ** Changed in: php5 (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1304565 Title: package php5-gd 5.4.6-1ubuntu1.8 failed to install/upgrade: 子进程 已安装 post-installation 脚本 返回了错误号 2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1304565/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1225546] Re: php5-fpm crashed with SIGSEGV in ZEND_FETCH_DIM_R_SPEC_VAR_CONST_HANDLER()
*** This bug is a duplicate of bug 1236733 *** https://bugs.launchpad.net/bugs/1236733 ** Also affects: php via http://bugs.php.net/bug.php?id=65510 Importance: Unknown Status: Unknown ** This bug has been marked a duplicate of bug 1236733 Crash in _get_zval_ptr_ptr_var -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1225546 Title: php5-fpm crashed with SIGSEGV in ZEND_FETCH_DIM_R_SPEC_VAR_CONST_HANDLER() To manage notifications about this bug go to: https://bugs.launchpad.net/php/+bug/1225546/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267255] Re: [MIR] php5 (php5-fpm binary)
I'm just a user who would like to see FPM have security and QA support for the full 60 months of an LTS release along with the other PHP SAPIs, so I (and others) can use a supported PHP backend with nginx instead of having to use Apache. Now nginx-core is in main it would be excellent to have a fully supported LEMP stack going in Ubuntu. I'm not otherwise involved in the Ubuntu project other than filing the odd bug. I can keep momentum going on getting the package promoted but I can't commit to ongoing maintenance of the package once it's in main. So I can go to ubuntu-server list to ask for help with this, since I know PHP is a difficult set of packages to maintain and those currently taking on this responsibility may not have the bandwidth to provide full support for an additional package. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1267255 Title: [MIR] php5 (php5-fpm binary) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1267255/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267255] Re: [MIR] php5 (php5-fpm binary)
Hi Robie, I can't comment on that. All I did was follow the process for filing the MIR bug; I'm not sure how to progress it from here. If I need to post on the ubuntu-server list to get attention I'm happy to do so. I believe this bug is at step 4 of https://wiki.ubuntu.com/MainInclusionProcess, and waiting for review by ~ubuntu-mir team. If there's more to the process then where can I find that information? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1267255 Title: [MIR] php5 (php5-fpm binary) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1267255/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267255] Re: [MIR] php5 (php5-fpm binary)
Having said that I see on that wiki page "New binary packages from existing source packages, where the source package is already in main, do not require reports." But who to notify about this bug so php5-fpm can move to main? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1267255 Title: [MIR] php5 (php5-fpm binary) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1267255/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267255] Re: [MIR] php5 (php5-fpm binary)
** Tags added: utopic -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1267255 Title: [MIR] php5 (php5-fpm binary) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1267255/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1307027] Re: php5-fpm: Possible privilege escalation due to insecure default permissions of sockets
** Bug watch added: bugs.php.net/ #67060 http://bugs.php.net/bug.php?id=67060 ** Also affects: php via http://bugs.php.net/bug.php?id=67060 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1307027 Title: php5-fpm: Possible privilege escalation due to insecure default permissions of sockets To manage notifications about this bug go to: https://bugs.launchpad.net/php/+bug/1307027/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1244713] Re: invalid syntax for check_ssh plugin
** Tags added: saucy -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nagios-plugins in Ubuntu. https://bugs.launchpad.net/bugs/1244713 Title: invalid syntax for check_ssh plugin To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nagios-plugins/+bug/1244713/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267255] Re: [MIR] php5 (php5-fpm binary)
** Tags added: trusty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1267255 Title: [MIR] php5 (php5-fpm binary) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1267255/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 498022] Re: Need package for php5 without suhosin patch
As of 5.4.4-1ubuntu1 in quantal, Suhosin patch has been disabled. See http://changelogs.ubuntu.com/changelogs/pool/main/p/php5/php5_5.4.6-1ubuntu1.5/changelog. ** Changed in: php5 (Ubuntu) Status: Confirmed => Fix Released ** Tags added: precise -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/498022 Title: Need package for php5 without suhosin patch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/498022/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1189986] Re: Please backport fixes
** Bug watch added: Debian Bug tracker #711980 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711980 ** Also affects: php5 (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711980 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1189986 Title: Please backport fixes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1189986/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267255] Re: [MIR] php5 (php5-fpm binary)
** Description changed: NOTE: I only saw that where the source package is in main reports are not required after spending most of the day writing this up. It's my first MIR so apologies if this isn't the correct process for promoting a binary of an existing source package - I couldn't find documentation on what to do to make that request. From the PHP documentation: FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features (mostly) useful for heavy-loaded sites. Availability: Available in Ubuntu universe in all currently supported Ubuntu releases. Latest release builds on all architectures (amd64, arm64, armhf, i386, powerpc, ppc64el)[1]. Also available on Debian Wheezy (it was not included in Squeeze as FPM was introduced to PHP core too close to Squeeze's release[2]). Rationale: Commonly combined with nginx, and can be used with all servers supporting FastCGI (Apache, Lighttpd, etc). With some momentum behind adding nginx to main[3] it would be nice to have something with security support that can be paired with it to have comparable functionality to the common apache2 + libapache2-mod-php5 combination. According to Ubuntu popcon php5-fpm is used regularly by 950 people, which compares favourably to nginx (nginx-common) which is used regularly by 639 people (according to "Vote" stats). Security: php5 is already in main so this search is limited to security issues affecting FPM specifically. PHP FPM is included with and supported as part of the core PHP release in all currently supported versions (5.3.x, 5.4.x and 5.5.x). It therefore has security support from the core PHP team. It also has security support from upstream Debian. A search for "fpm" on cve.mitre.org and NVD returns only CVE-2012-0831. This appears to have been disclosed responsibly and fixed promptly (NVD shows vulnerability release date of Feb 10, 2012. It was fixed in PHP prior to this disclosure on Feb 2, 2012.) The USN with updated packages was released Feb 9, 2012. There are currently no affecting CVEs listed in Ubuntu's security tracker for php5 package[4]. There are currently four open issues listed in Debian's security tracker (not counting "unimportant issues" for php5 package[5]: * CVE-2010-4657 per Ubuntu tracker "can't reproduce on quantal+", so does not affect Trusty. * CVE-2011-1398 fixed upstream in 5.4.0, so does not affect Trusty. * CVE-2011-4718 fixed upstream in 5.5.2, so does not affect Trusty. * CVE-2012-0789 fixed upstream in 5.5.0, so does not affect Trusty. The php5-fpm binary is installed in /usr/sbin and installs a daemon. The daemon by default is not public facing and starts a socket listening at /var/run/php5-fpm.sock. Based on this an in-depth security review is required. Quality assurance: The package is automatically started after installation. Provided a web server is correctly configured it should be possible to use this package without any further configuration to begin serving PHP pages. There are no debconf questions asked during installation. Upstream PHP FPM bugs: https://bugs.php.net/search.php?cmd=display&package_name[]=FPM+related Debian bugs: http://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=php5-fpm Ubuntu bugs: https://launchpad.net/ubuntu/+source/php5/+bugs?field.searchtext=fpm - Ubuntu bug 1242376 must be fixed, as this affects reloading FPM when using - Upstart. Ubuntu bug 1230917 must be fixed, as this affects logrotate when using Upstart and will send weekly warning emails from cron. Other Ubuntu bugs either require more information or relate to PHP core or a module, not FPM. In Debian there are currently no outstanding bugs that can be actioned. In PHP upstream there are several relevant open bugs: * 55508 - feature request to listen on IPv6 addresses (current support is limited to IPv4 and sockets) * 62382 - access log format for FPM shows incorrect values for server time a request is received * 51983 - pm.status_path not working when cgi.fix_pathinfo=1 (long-standing, probably minor bug) * 53074 - looks like upstream version of Ubuntu bug 1242376 * 53611 - fastcgi_param PHP_VALUE pollutes other sites (possible security issue, long-standing). Possibly related to 61867 and 63965. * 60961 - Graceful Restart (USR2) isn't very graceful. Possibly related to 63395. * 61558 - Runaway spawning of children after pipe error * 62172 - FPM not working with Apache httpd 2.4 balancer/fcgi setup * 55322, 62279 - chroot issues * 64626 - PHP-FPM may segfault/hang on startup Whether any of these are blockers is up to discretion of MIR approval team. If any are blockers then please state which ones so they can be tracked for a future MIR. In Debian PTS there are several Lintian errors and warnings for php5, however php5-fpm is clean. There is a build warning on p
[Bug 1242376] Re: "reload php5-fpm" crashes
** Tags added: saucy -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1242376 Title: "reload php5-fpm" crashes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1242376/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1267255] [NEW] [MIR] php5 (php5-fpm binary)
Public bug reported: NOTE: I only saw that where the source package is in main reports are not required after spending most of the day writing this up. It's my first MIR so apologies if this isn't the correct process for promoting a binary of an existing source package - I couldn't find documentation on what to do to make that request. >From the PHP documentation: FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features (mostly) useful for heavy-loaded sites. Availability: Available in Ubuntu universe in all currently supported Ubuntu releases. Latest release builds on all architectures (amd64, arm64, armhf, i386, powerpc, ppc64el)[1]. Also available on Debian Wheezy (it was not included in Squeeze as FPM was introduced to PHP core too close to Squeeze's release[2]). Rationale: Commonly combined with nginx, and can be used with all servers supporting FastCGI (Apache, Lighttpd, etc). With some momentum behind adding nginx to main[3] it would be nice to have something with security support that can be paired with it to have comparable functionality to the common apache2 + libapache2-mod-php5 combination. According to Ubuntu popcon php5-fpm is used regularly by 950 people, which compares favourably to nginx (nginx-common) which is used regularly by 639 people (according to "Vote" stats). Security: php5 is already in main so this search is limited to security issues affecting FPM specifically. PHP FPM is included with and supported as part of the core PHP release in all currently supported versions (5.3.x, 5.4.x and 5.5.x). It therefore has security support from the core PHP team. It also has security support from upstream Debian. A search for "fpm" on cve.mitre.org and NVD returns only CVE-2012-0831. This appears to have been disclosed responsibly and fixed promptly (NVD shows vulnerability release date of Feb 10, 2012. It was fixed in PHP prior to this disclosure on Feb 2, 2012.) The USN with updated packages was released Feb 9, 2012. There are currently no affecting CVEs listed in Ubuntu's security tracker for php5 package[4]. There are currently four open issues listed in Debian's security tracker (not counting "unimportant issues" for php5 package[5]: * CVE-2010-4657 per Ubuntu tracker "can't reproduce on quantal+", so does not affect Trusty. * CVE-2011-1398 fixed upstream in 5.4.0, so does not affect Trusty. * CVE-2011-4718 fixed upstream in 5.5.2, so does not affect Trusty. * CVE-2012-0789 fixed upstream in 5.5.0, so does not affect Trusty. The php5-fpm binary is installed in /usr/sbin and installs a daemon. The daemon by default is not public facing and starts a socket listening at /var/run/php5-fpm.sock. Based on this an in-depth security review is required. Quality assurance: The package is automatically started after installation. Provided a web server is correctly configured it should be possible to use this package without any further configuration to begin serving PHP pages. There are no debconf questions asked during installation. Upstream PHP FPM bugs: https://bugs.php.net/search.php?cmd=display&package_name[]=FPM+related Debian bugs: http://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=php5-fpm Ubuntu bugs: https://launchpad.net/ubuntu/+source/php5/+bugs?field.searchtext=fpm Ubuntu bug 1242376 must be fixed, as this affects reloading FPM when using Upstart. Ubuntu bug 1230917 must be fixed, as this affects logrotate when using Upstart and will send weekly warning emails from cron. Other Ubuntu bugs either require more information or relate to PHP core or a module, not FPM. In Debian there are currently no outstanding bugs that can be actioned. In PHP upstream there are several relevant open bugs: * 55508 - feature request to listen on IPv6 addresses (current support is limited to IPv4 and sockets) * 62382 - access log format for FPM shows incorrect values for server time a request is received * 51983 - pm.status_path not working when cgi.fix_pathinfo=1 (long-standing, probably minor bug) * 53074 - looks like upstream version of Ubuntu bug 1242376 * 53611 - fastcgi_param PHP_VALUE pollutes other sites (possible security issue, long-standing). Possibly related to 61867 and 63965. * 60961 - Graceful Restart (USR2) isn't very graceful. Possibly related to 63395. * 61558 - Runaway spawning of children after pipe error * 62172 - FPM not working with Apache httpd 2.4 balancer/fcgi setup * 55322, 62279 - chroot issues * 64626 - PHP-FPM may segfault/hang on startup Whether any of these are blockers is up to discretion of MIR approval team. If any are blockers then please state which ones so they can be tracked for a future MIR. In Debian PTS there are several Lintian errors and warnings for php5, however php5-fpm is clean. There is a build warning on powerpc but no build failures. The package does not deal with specific hardware. The package ships a test suite which is referenced in debian/rules. The package inc