[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#727087: pu: package php5/5.4.4-14+deb7u6



Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: pu

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi release team,

the PHP team (well kudos go to William again) have prepared next batch
of php5 stable updates.

  * upstream fix: curl memory leak (Closes: #725868)
  * upstream fix: allow root to run php-fpm (Closes: #725890)
  * upstream fix: remove annoying warnings with php-fpm and user usage
    (Closes: #725972)
  * upstream fix: memoryleak in function declaration (Closes: #726033)
  * upstream fix: munmap() is called with the incorrect length (Closes: #726037)
  * upstream fix: segfault on zend_deactivate (Closes: #726295)
  * upstream fix: Possible null dereference (Closes: #726320)
  * upstream fix: Phar::buildFromDirectory creates corrupt archives
    (Closes: #726379)
  * upstream fix: segfault while loading extensions (Closes: #726627)
  * upstream fix: (un)serialize() leaves dangling pointers, causes crashes
    (Closes: #726633)

Debdiff is attached:

$ diffstat php5_5.4.4-14+deb7u6.debdiff
 debian/patches/Memory-leak-when-reusing-curl-handle.patch                                        |   25 +
 debian/patches/Memoryleak-when-using-the-same-variablename-2times-in-function-declaration.patch  |   41 +
 debian/patches/Phar-buildFromDirectory-creates-corrupt-archives-for-some-specific-contents.patch |  211 ++++++++++
 debian/patches/Possible-null-dereference.patch                                                   |   38 +
 debian/patches/SegFault-on-zend_deactivate.patch                                                 |   87 ++++
 debian/patches/Segfault-while-load-extension-failed-in-zts-build.patch                           |   19 
 debian/patches/Track-created-curl_slist-structs-by-option-so-they-can-be-updated-in-situ.patch   |  123 +++++
 debian/patches/Unneccesary-warnings-on-FPM.patch                                                 |  197 +++++++++
 debian/patches/munmap-is-called-with-the-incorrect-length.patch                                  |   19 
 debian/patches/php-fpm-is-not-allowed-to-run-as-root.patch                                       |  124 +++++
 debian/patches/serialize-leaves-dangling-pointers-causes-crashes.patch                           |   37 +
 php5-5.4.4/debian/changelog                                                                      |   19 
 php5-5.4.4/debian/patches/series                                                                 |   11 
 13 files changed, 951 insertions(+)

git changelog with references to upstream fixes:

commit 680847f344501c1cb1165c62756a6af79953d2c4
Author: Ondřej Surý <ondrej@sury.org>
Date:   Tue Oct 22 08:34:51 2013 +0200

    prepare 5.4.4-14+deb7u6 release

commit ff7d1c0f16e6fb70fcf7704eefca6851c95e438d
Author: William Dauchy <william@gandi.net>
Date:   Thu Oct 17 14:50:16 2013 +0200

    upstream fix: (un)serialize() leaves dangling pointers, causes crashes
    
    upstream fix f2bffdc
    fix bug #63369
    (un)serialize() leaves dangling pointers, causes crashes
    
    Closes: #726633

commit 8eeeecba89da01478eec4c7be3cea1b5061ebd7d
Author: William Dauchy <william@gandi.net>
Date:   Thu Oct 17 14:27:57 2013 +0200

    upstream fix: segfault while loading extensions
    
    upstream commit 4c6678d
    Fixed bug #63093 (Segfault while load extension failed in zts-build).
    
    Closes: #726627

commit f29a95bcb49ed756ecb03a94b175f747fd15f220
Author: William Dauchy <william@gandi.net>
Date:   Tue Oct 15 10:05:11 2013 +0200

    upstream fix: Phar::buildFromDirectory creates corrupt archives
    
    upstream commit f8efdc2
    fix bug #65028 	Phar::buildFromDirectory creates corrupt archives
    for some specific contents
    
    Closes: #726379

commit 84cb4951d88b07098ce46250f9d768cd11549ac6
Author: William Dauchy <william@gandi.net>
Date:   Mon Oct 14 16:40:50 2013 +0200

    upstream fix: Possible null dereference
    
    fix potential null dereference in fpm code
    upstream commit f08060a
    Fixed Bug #63581 Possible null dereference
    
    Closes: #726320

commit a73395d8b99228e24e4637cf33e0f8b00710c39a
Author: William Dauchy <william@gandi.net>
Date:   Mon Oct 14 09:53:48 2013 +0200

    upstream fix: segfault on zend_deactivate
    
    upstream commit 77fffff
    Fixed bug #64720 (SegFault on zend_deactivate)
    
    Closes: #726295

commit fb8eadcba6a2ba6ad13c168702c2a4421f081457
Author: William Dauchy <william@gandi.net>
Date:   Fri Oct 11 14:51:18 2013 +0200

    upstream fix: munmap() is called with the incorrect length
    
    upstream commit 433089c
    Fixed bug #62716 (munmap() is called with the incorrect length)
    
    This could lead to memory leak as well
    
    Closes: #726037

commit 49efe9843641931d93bc94fa4f9ddb80ee076b1c
Author: William Dauchy <william@gandi.net>
Date:   Fri Oct 11 14:30:00 2013 +0200

    upstream fix: memoryleak in function declaration
    
    Memoryleak when using the same variablename two times in function declaration
    upstream commit 5e9377e
    
    Closes: #726033

commit 1bb0af1d2bf209ee76bd4d4511fe1eac09233956
Author: William Dauchy <william@gandi.net>
Date:   Thu Oct 10 16:09:44 2013 +0200

    upstream fix: remove annoying warnings with php-fpm and user usage
    
    upstream commit e31553c
    - Fixed bug #62947 (Unneccesary warnings on FPM)
    
    Closes: #725972

commit bd5469f168784ad8832cd94f37204853b5cec526
Author: William Dauchy <william@gandi.net>
Date:   Wed Oct 9 19:43:19 2013 +0200

    upstream fix: allow root to run php-fpm
    
    Closes: #725891

commit 68dc168ba0d3447154ac2eb248bacdf1eb3cbda8
Author: William Dauchy <william@gandi.net>
Date:   Wed Oct 9 19:34:22 2013 +0200

    upstream fix: make sure to refresh patches to get exact match

commit 1cd1eba6099fc63b458b78fb096ca08e719e15ed
Author: William Dauchy <william@gandi.net>
Date:   Wed Oct 9 14:18:50 2013 +0200

    upstream fix: curl memory leak
    
    Fixing two memleaks using curl in php5:
    
    commit aa7d3d8 upstream
    Track created curl_slist structs by option so they can be updated in situ
    
    commit ac3d227 upstream
    Fixed #63859 Memory leak when reusing curl-handle
    
    Closes: #725868


Thank you for considering this update,
Ondrej&William

- -- System Information:
Debian Release: 7.1
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlJmLHUACgkQ9OZqfMIN8nMIywCgrY9O1c4XJcHxsk7mILgjtpU5
VD8AoIUC/fXB0djgVNaUaMxZj4qTrJD9
=Z0Hl
-----END PGP SIGNATURE-----
diff -u php5-5.4.4/debian/changelog php5-5.4.4/debian/changelog
--- php5-5.4.4/debian/changelog
+++ php5-5.4.4/debian/changelog
@@ -1,3 +1,22 @@
+php5 (5.4.4-14+deb7u6) stable; urgency=low
+
+  [ William Dauchy ]
+  * upstream fix: curl memory leak (Closes: #725868)
+  * upstream fix: allow root to run php-fpm (Closes: #725891)
+  * upstream fix: remove annoying warnings with php-fpm and user usage
+    (Closes: #725972)
+  * upstream fix: memoryleak in function declaration (Closes: #726033)
+  * upstream fix: munmap() is called with the incorrect length (Closes: #726037)
+  * upstream fix: segfault on zend_deactivate (Closes: #726295)
+  * upstream fix: Possible null dereference (Closes: #726320)
+  * upstream fix: Phar::buildFromDirectory creates corrupt archives
+    (Closes: #726379)
+  * upstream fix: segfault while loading extensions (Closes: #726627)
+  * upstream fix: (un)serialize() leaves dangling pointers, causes crashes
+    (Closes: #726633)
+
+ -- Ondřej Surý <ondrej@debian.org>  Tue, 22 Oct 2013 08:33:07 +0200
+
 php5 (5.4.4-14+deb7u5) stable; urgency=low
 
   [ William Dauchy ]
diff -u php5-5.4.4/debian/patches/series php5-5.4.4/debian/patches/series
--- php5-5.4.4/debian/patches/series
+++ php5-5.4.4/debian/patches/series
@@ -93,0 +94,11 @@
+Track-created-curl_slist-structs-by-option-so-they-can-be-updated-in-situ.patch
+Memory-leak-when-reusing-curl-handle.patch
+php-fpm-is-not-allowed-to-run-as-root.patch
+Unneccesary-warnings-on-FPM.patch
+Memoryleak-when-using-the-same-variablename-2times-in-function-declaration.patch
+munmap-is-called-with-the-incorrect-length.patch
+SegFault-on-zend_deactivate.patch
+Possible-null-dereference.patch
+Phar-buildFromDirectory-creates-corrupt-archives-for-some-specific-contents.patch
+Segfault-while-load-extension-failed-in-zts-build.patch
+serialize-leaves-dangling-pointers-causes-crashes.patch
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Possible-null-dereference.patch
+++ php5-5.4.4/debian/patches/Possible-null-dereference.patch
@@ -0,0 +1,38 @@
+commit f08060a48fadf079e860be73584ac87747dc59d6
+Author: Remi Collet <remi@php.net>
+Date:   Wed Nov 28 10:28:18 2012 +0100
+
+    Fixed Bug #63581 Possible null dereference
+    
+    Possible NULL dereference when trying to delete the single item
+    of a list (ack from fat).
+    
+    This issues where found from by static code analysis tool and,
+    so, I can't provide any reproducer.
+
+diff --git a/sapi/fpm/fpm/fpm_events.c b/sapi/fpm/fpm/fpm_events.c
+index d5f7483..d5835f0 100644
+--- a/sapi/fpm/fpm/fpm_events.c
++++ b/sapi/fpm/fpm/fpm_events.c
+@@ -188,7 +188,9 @@ static int fpm_event_queue_del(struct fpm_event_queue_s **queue, struct fpm_even
+ 			}
+ 			if (q == *queue) {
+ 				*queue = q->next;
+-				(*queue)->prev = NULL;
++				if (*queue) {
++					(*queue)->prev = NULL;
++				}
+ 			}
+ 
+ 			/* ask the event module to remove the fd from its own queue */
+@@ -432,7 +434,9 @@ void fpm_event_loop(int err) /* {{{ */
+ 						}
+ 						if (q == fpm_event_queue_timer) {
+ 							fpm_event_queue_timer = q->next;
+-							fpm_event_queue_timer->prev = NULL;
++							if (fpm_event_queue_timer) {
++								fpm_event_queue_timer->prev = NULL;
++							}
+ 						}
+ 						q = q->next;
+ 						free(q2);
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Unneccesary-warnings-on-FPM.patch
+++ php5-5.4.4/debian/patches/Unneccesary-warnings-on-FPM.patch
@@ -0,0 +1,197 @@
+commit decc394a2089b955a175aed0091044d0fc3d1aab
+Author: Jerome Loyet <fat@php.net>
+Date:   Sat May 26 18:24:08 2012 +0200
+
+    - Fixed bug #62160 (Add process.priority to set nice(2) priorities)
+
+commit e31553c2042f2a5e05d9ad1ba77b888c63e4c36f
+Author: Jerome Loyet <fat@php.net>
+Date:   Fri Sep 28 01:08:08 2012 +0200
+
+    - Fixed bug #62947 (Unneccesary warnings on FPM)
+
+--- a/sapi/fpm/fpm/fpm_conf.c
++++ b/sapi/fpm/fpm/fpm_conf.c
+@@ -70,6 +70,7 @@
+ 	.syslog_facility = -1,
+ #endif
+ 	.process_max = 0,
++	.process_priority = 64, /* 64 means unset */
+ };
+ static struct fpm_worker_pool_s *current_wp = NULL;
+ static int ini_recursion = 0;
+@@ -92,6 +93,7 @@
+ 	{ "emergency_restart_interval",  &fpm_conf_set_time,            GO(emergency_restart_interval) },
+ 	{ "process_control_timeout",     &fpm_conf_set_time,            GO(process_control_timeout) },
+ 	{ "process.max",                 &fpm_conf_set_integer,         GO(process_max) },
++	{ "process.priority",            &fpm_conf_set_integer,         GO(process_priority) },
+ 	{ "daemonize",                   &fpm_conf_set_boolean,         GO(daemonize) },
+ 	{ "rlimit_files",                &fpm_conf_set_integer,         GO(rlimit_files) },
+ 	{ "rlimit_core",                 &fpm_conf_set_rlimit_core,     GO(rlimit_core) },
+@@ -112,6 +114,7 @@
+ 	{ "listen.group",              &fpm_conf_set_string,      WPO(listen_group) },
+ 	{ "listen.mode",               &fpm_conf_set_string,      WPO(listen_mode) },
+ 	{ "listen.allowed_clients",    &fpm_conf_set_string,      WPO(listen_allowed_clients) },
++	{ "process.priority",          &fpm_conf_set_integer,     WPO(process_priority) },
+ 	{ "pm",                        &fpm_conf_set_pm,          WPO(pm) },
+ 	{ "pm.max_children",           &fpm_conf_set_integer,     WPO(pm_max_children) },
+ 	{ "pm.start_servers",          &fpm_conf_set_integer,     WPO(pm_start_servers) },
+@@ -577,6 +580,7 @@
+ 	memset(wp->config, 0, sizeof(struct fpm_worker_pool_config_s));
+ 	wp->config->listen_backlog = FPM_BACKLOG_DEFAULT;
+ 	wp->config->pm_process_idle_timeout = 10; /* 10s by default */
++	wp->config->process_priority = 64; /* 64 means unset */
+ 
+ 	if (!fpm_worker_all_pools) {
+ 		fpm_worker_all_pools = wp;
+@@ -741,6 +745,11 @@
+ 			return -1;
+ 		}
+ 
++		if (wp->config->process_priority != 64 && (wp->config->process_priority < -19 || wp->config->process_priority > 20)) {
++			zlog(ZLOG_ERROR, "[pool %s] process.priority must be included into [-19,20]", wp->config->name);
++			return -1;
++		}
++
+ 		/* pm */
+ 		if (wp->config->pm != PM_STYLE_STATIC && wp->config->pm != PM_STYLE_DYNAMIC && wp->config->pm != PM_STYLE_ONDEMAND) {
+ 			zlog(ZLOG_ALERT, "[pool %s] the process manager is missing (static, dynamic or ondemand)", wp->config->name);
+@@ -1103,6 +1112,11 @@
+ 		return -1;
+ 	}
+ 
++	if (fpm_global_config.process_priority != 64 && (fpm_global_config.process_priority < -19 || fpm_global_config.process_priority > 20)) {
++		zlog(ZLOG_ERROR, "process.priority must be included into [-19,20]");
++		return -1;
++	}
++
+ 	if (!fpm_global_config.error_log) {
+ 		fpm_global_config.error_log = strdup("log/php-fpm.log");
+ 	}
+@@ -1485,6 +1499,11 @@
+ 	zlog(ZLOG_NOTICE, "\temergency_restart_threshold = %d", fpm_global_config.emergency_restart_threshold);
+ 	zlog(ZLOG_NOTICE, "\tprocess_control_timeout = %ds",    fpm_global_config.process_control_timeout);
+ 	zlog(ZLOG_NOTICE, "\tprocess.max = %d",                 fpm_global_config.process_max);
++	if (fpm_global_config.process_priority == 64) {
++		zlog(ZLOG_NOTICE, "\tprocess.priority = undefined");
++	} else {
++		zlog(ZLOG_NOTICE, "\tprocess.priority = %d", fpm_global_config.process_priority);
++	}
+ 	zlog(ZLOG_NOTICE, "\tdaemonize = %s",                   BOOL2STR(fpm_global_config.daemonize));
+ 	zlog(ZLOG_NOTICE, "\trlimit_files = %d",                fpm_global_config.rlimit_files);
+ 	zlog(ZLOG_NOTICE, "\trlimit_core = %d",                 fpm_global_config.rlimit_core);
+@@ -1504,6 +1523,11 @@
+ 		zlog(ZLOG_NOTICE, "\tlisten.group = %s",               STR2STR(wp->config->listen_group));
+ 		zlog(ZLOG_NOTICE, "\tlisten.mode = %s",                STR2STR(wp->config->listen_mode));
+ 		zlog(ZLOG_NOTICE, "\tlisten.allowed_clients = %s",     STR2STR(wp->config->listen_allowed_clients));
++		if (wp->config->process_priority == 64) {
++			zlog(ZLOG_NOTICE, "\tprocess.priority = undefined");
++		} else {
++			zlog(ZLOG_NOTICE, "\tprocess.priority = %d", wp->config->process_priority);
++		}
+ 		zlog(ZLOG_NOTICE, "\tpm = %s",                         PM2STR(wp->config->pm));
+ 		zlog(ZLOG_NOTICE, "\tpm.max_children = %d",            wp->config->pm_max_children);
+ 		zlog(ZLOG_NOTICE, "\tpm.start_servers = %d",           wp->config->pm_start_servers);
+--- a/sapi/fpm/fpm/fpm_conf.h
++++ b/sapi/fpm/fpm/fpm_conf.h
+@@ -35,6 +35,7 @@
+ 	int emergency_restart_interval;
+ 	int process_control_timeout;
+ 	int process_max;
++	int process_priority;
+ 	int daemonize;
+ 	int rlimit_files;
+ 	int rlimit_core;
+@@ -57,6 +58,7 @@
+ 	char *listen_group;
+ 	char *listen_mode;
+ 	char *listen_allowed_clients;
++	int process_priority;
+ 	int pm;
+ 	int pm_max_children;
+ 	int pm_start_servers;
+--- a/sapi/fpm/fpm/fpm_unix.c
++++ b/sapi/fpm/fpm/fpm_unix.c
+@@ -128,6 +128,9 @@
+ 		if (wp->config->chroot && *wp->config->chroot) {
+ 			zlog(ZLOG_WARNING, "[pool %s] 'chroot' directive is ignored when FPM is not running as root", wp->config->name);
+ 		}
++		if (wp->config->process_priority != 64) {
++			zlog(ZLOG_WARNING, "[pool %s] 'process.priority' directive is ignored when FPM is not running as root", wp->config->name);
++		}
+ 
+ 		/* set up HOME and USER anyway */
+ 		pwd = getpwuid(getuid());
+@@ -183,6 +186,14 @@
+ 	}
+ 
+ 	if (is_root) {
++
++		if (wp->config->process_priority != 64) {
++			if (setpriority(PRIO_PROCESS, 0, wp->config->process_priority) < 0) {
++				zlog(ZLOG_SYSERROR, "[pool %s] Unable to set priority for this new process", wp->config->name);
++				return -1;
++			}
++		}
++
+ 		if (wp->set_gid) {
+ 			if (0 > setgid(wp->set_gid)) {
+ 				zlog(ZLOG_SYSERROR, "[pool %s] failed to setgid(%d)", wp->config->name, wp->set_gid);
+@@ -217,6 +228,7 @@
+ int fpm_unix_init_main() /* {{{ */
+ {
+ 	struct fpm_worker_pool_s *wp;
++	int is_root = !geteuid();
+ 
+ 	if (fpm_global_config.rlimit_files) {
+ 		struct rlimit r;
+@@ -259,6 +271,17 @@
+ 		return -1;
+ 	}
+ 
++	if (fpm_global_config.process_priority != 64) {
++		if (is_root) {
++			if (setpriority(PRIO_PROCESS, 0, fpm_global_config.process_priority) < 0) {
++				zlog(ZLOG_SYSERROR, "Unable to set priority for the master process");
++				return -1;
++			}
++		} else {
++			zlog(ZLOG_WARNING, "'process.priority' directive is ignored when FPM is not running as root");
++		}
++	}
++
+ 	fpm_globals.parent_pid = getpid();
+ 	for (wp = fpm_worker_all_pools; wp; wp = wp->next) {
+ 		if (0 > fpm_unix_conf_wp(wp)) {
+--- a/sapi/fpm/php-fpm.conf.in
++++ b/sapi/fpm/php-fpm.conf.in
+@@ -76,6 +76,14 @@
+ ; Default Value: 0
+ ; process.max = 128
+ 
++; Specify the nice(2) priority to apply to the master process (only if set)
++; The value can vary from -19 (highest priority) to 20 (lower priority)
++; Note: - It will only work if the FPM master process is launched as root
++;       - The pool process will inherit the master process priority
++;         unless it specified otherwise
++; Default Value: no set
++; process.priority = -19
++
+ ; Send FPM to background. Set to 'no' to keep FPM in foreground for debugging.
+ ; Default Value: yes
+ ;daemonize = yes
+@@ -167,6 +175,14 @@
+ ; Default Value: any
+ ;listen.allowed_clients = 127.0.0.1
+ 
++; Specify the nice(2) priority to apply to the pool processes (only if set)
++; The value can vary from -19 (highest priority) to 20 (lower priority)
++; Note: - It will only work if the FPM master process is launched as root
++;       - The pool processes will inherit the master process priority
++;         unless it specified otherwise
++; Default Value: no set
++; priority = -19
++
+ ; Choose how the process manager will control the number of child processes.
+ ; Possible Values:
+ ;   static  - a fixed number (pm.max_children) of child processes;
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Memoryleak-when-using-the-same-variablename-2times-in-function-declaration.patch
+++ php5-5.4.4/debian/patches/Memoryleak-when-using-the-same-variablename-2times-in-function-declaration.patch
@@ -0,0 +1,41 @@
+commit 5e9377ebd57f419de7b421878df540795ace01ef
+Author: Xinchen Hui <laruence@php.net>
+Date:   Tue Mar 26 11:44:57 2013 +0800
+
+    Fixed bug #64515 (Memoryleak when using the same variablename 2times in function declaration)
+
+--- /dev/null
++++ b/Zend/tests/bug64515.phpt
+@@ -0,0 +1,10 @@
++--TEST--
++Bug #64515 (Memoryleak when using the same variablename 2times in function declaration)
++--FILE--
++<?php
++function foo($unused = null, $unused = null, $arg = array()) {
++	    return 1;
++}
++foo();
++?>
++--EXPECT--
+--- a/Zend/zend_vm_def.h
++++ b/Zend/zend_vm_def.h
+@@ -3240,7 +3240,7 @@
+ 
+ 	zend_verify_arg_type((zend_function *) EG(active_op_array), arg_num, assignment_value, opline->extended_value TSRMLS_CC);
+ 	var_ptr = _get_zval_ptr_ptr_cv_BP_VAR_W(EX_CVs(), opline->result.var TSRMLS_CC);
+-	Z_DELREF_PP(var_ptr);
++	zval_ptr_dtor(var_ptr);
+ 	*var_ptr = assignment_value;
+ 
+ 	CHECK_EXCEPTION();
+--- a/Zend/zend_vm_execute.h
++++ b/Zend/zend_vm_execute.h
+@@ -1368,7 +1368,7 @@
+ 
+ 	zend_verify_arg_type((zend_function *) EG(active_op_array), arg_num, assignment_value, opline->extended_value TSRMLS_CC);
+ 	var_ptr = _get_zval_ptr_ptr_cv_BP_VAR_W(EX_CVs(), opline->result.var TSRMLS_CC);
+-	Z_DELREF_PP(var_ptr);
++	zval_ptr_dtor(var_ptr);
+ 	*var_ptr = assignment_value;
+ 
+ 	CHECK_EXCEPTION();
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/munmap-is-called-with-the-incorrect-length.patch
+++ php5-5.4.4/debian/patches/munmap-is-called-with-the-incorrect-length.patch
@@ -0,0 +1,19 @@
+commit 433089ccb4d4747a01d522e8678664ff17584615
+Author: Xinchen Hui <laruence@php.net>
+Date:   Thu Aug 2 12:30:07 2012 +0800
+
+    Fixed bug #62716 (munmap() is called with the incorrect length)
+
+diff --git a/Zend/zend_stream.c b/Zend/zend_stream.c
+index 5a02ecd..bc5206c 100644
+--- a/Zend/zend_stream.c
++++ b/Zend/zend_stream.c
+@@ -79,7 +79,7 @@ static size_t zend_stream_stdio_fsizer(void *handle TSRMLS_DC) /* {{{ */
+ static void zend_stream_unmap(zend_stream *stream TSRMLS_DC) { /* {{{ */
+ #if HAVE_MMAP
+ 	if (stream->mmap.map) {
+-		munmap(stream->mmap.map, stream->mmap.len);
++		munmap(stream->mmap.map, stream->mmap.len + ZEND_MMAP_AHEAD);
+ 	} else
+ #endif
+ 	if (stream->mmap.buf) {
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Phar-buildFromDirectory-creates-corrupt-archives-for-some-specific-contents.patch
+++ php5-5.4.4/debian/patches/Phar-buildFromDirectory-creates-corrupt-archives-for-some-specific-contents.patch
@@ -0,0 +1,211 @@
+commit f8efdc2b4bca2a8f7e57aae36a01df044ba3d0b5
+Author: Stanislav Malyshev <stas@php.net>
+Date:   Mon Jul 22 00:56:45 2013 -0700
+
+    fix bug #65028 	Phar::buildFromDirectory creates corrupt archives for some specific contents
+
+--- a/ext/phar/phar.c
++++ b/ext/phar/phar.c
+@@ -2579,6 +2579,7 @@
+ 	php_serialize_data_t metadata_hash;
+ 	smart_str main_metadata_str = {0};
+ 	int free_user_stub, free_fp = 1, free_ufp = 1;
++	int manifest_hack = 0;
+ 
+ 	if (phar->is_persistent) {
+ 		if (error) {
+@@ -2933,6 +2934,12 @@
+ 
+ 	manifest_len = offset + phar->alias_len + sizeof(manifest) + main_metadata_str.len;
+ 	phar_set_32(manifest, manifest_len);
++	/* Hack - see bug #65028, add padding byte to the end of the manifest */
++	if(manifest[0] == '\r' || manifest[0] == '\n') {
++		manifest_len++;
++		phar_set_32(manifest, manifest_len);
++		manifest_hack = 1;
++	}
+ 	phar_set_32(manifest+4, new_manifest_count);
+ 	if (has_dirs) {
+ 		*(manifest + 8) = (unsigned char) (((PHAR_API_VERSION) >> 8) & 0xFF);
+@@ -3055,6 +3062,22 @@
+ 			}
+ 
+ 			return EOF;
++		}
++	}
++	/* Hack - see bug #65028, add padding byte to the end of the manifest */
++	if(manifest_hack) {
++		if(1 != php_stream_write(newfile, manifest, 1)) {
++			if (closeoldfile) {
++				php_stream_close(oldfile);
++			}
++
++			php_stream_close(newfile);
++
++			if (error) {
++				spprintf(error, 0, "unable to write manifest padding byte");
++			}
++
++			return EOF;
+ 		}
+ 	}
+ 
+--- /dev/null
++++ b/ext/phar/tests/bug65028.phpt
+@@ -0,0 +1,156 @@
++--TEST--
++Phar - test specific manifest length
++--INI--
++phar.readonly=0
++--SKIPIF--
++<?php if (!extension_loaded("phar")) die("skip"); ?>
++--FILE--
++<?php
++
++$files = array(
++	"lib/widgets/Widgets.php",
++	"lib/events/FormBeginEventArgs.php",
++	"lib/events/FormEndEventArgs.php",
++	"lib/Core.php",
++	"lib/database/MySqlDatabase.php",
++	"lib/utils/DateUtil.php",
++	"js/global.js",
++	"files/_emptyDirectory",
++	"files/search/schema.xml",
++	"vendor/Fusonic/Linq/Internal/WhereIterator.php",
++	"vendor/Fusonic/Linq/Internal/SelectManyIterator.php",
++	"vendor/Fusonic/Linq/Internal/SelectIterator.php",
++	"vendor/Fusonic/Linq/Internal/DiffIterator.php",
++	"vendor/Fusonic/Linq/Internal/GroupIterator.php",
++	"vendor/Fusonic/Linq/Internal/DistinctIterator.php",
++	"vendor/Fusonic/Linq/Internal/LinqHelper.php",
++	"vendor/Fusonic/Linq/Internal/OrderIterator.php",
++	"vendor/Fusonic/Linq/Internal/IntersectIterator.php",
++	"vendor/Fusonic/Linq/GroupedLinq.php",
++	"vendor/Fusonic/Linq.php",
++	"vendor/Fusonic/UI/Widgets/Forms/FormBegin.php",
++	"vendor/Fusonic/UI/Widgets/Forms/FormSectionBuilder.php",
++	"vendor/Fusonic/UI/Widgets/Forms/AutoSelect.php",
++	"vendor/Fusonic/UI/Widgets/Forms/ControlGroup.php",
++	"vendor/Fusonic/UI/Widgets/Forms/FormEnd.php",
++	"vendor/Fusonic/UI/Widgets/WidgetBase.php",
++	"modules/calendar/ajax/calendarGetInvitedUsersContentAjaxHandler.php",
++	"modules/calendar/js/calendarAppointmentForm.js",
++	"modules/calendar/misc/calendarAppointment.php",
++	"modules/calendar/pages/forms/calendarAppointmentForm.php",
++	"modules/calendar/setup/config.xml",
++	"modules/cmt/js/cmtMicroCommentsWidget.js",
++	"modules/cmt/setup/config.xml",
++	"modules/meta/misc/metaContentHelper.php",
++	"modules/meta/setup/config.xml",
++	"modules/brd/misc/brdPostStreamFormatter.php",
++	"modules/brd/misc/brdPost.php",
++	"modules/brd/setup/config/streamContents.xml",
++	"modules/brd/setup/resources/lang/en.xml",
++	"modules/brd/setup/resources/lang/de.xml",
++	"modules/brd/setup/config.xml",
++	"modules/auth/misc/authLoginService.php",
++	"modules/auth/setup/config.xml",
++	"modules/bwd/cache/bwdWordCacheCreator.php",
++	"modules/bwd/bwd.php",
++	"modules/bwd/setup/config.xml",
++	"modules/nws/templates/pages/forms/nwsNewsForm.tpl",
++	"modules/nws/templates/pages/nwsShowNewsPage.tpl",
++	"modules/nws/pages/forms/nwsNewsForm.php",
++	"modules/nws/pages/nwsShowNewsPage.php",
++	"modules/nws/setup/config.xml",
++	"modules/gmp/cache/gmpMarkersCacheCreator.php",
++	"modules/gmp/select/gmpMapContentSelect.php",
++	"modules/gmp/templates/gmpShowAppointmentPage.tpl",
++	"modules/gmp/templates/gmpShowLinkPage.tpl",
++	"modules/gmp/setup/config.xml",
++	"modules/mul/cache/mulVideoPortalCacheCreator.php",
++	"modules/mul/misc/mulPermissionHelper.php",
++	"modules/mul/templates/widgets/mulFileEmbedWidget_Video_Flv.tpl",
++	"modules/mul/setup/config/mulUploadVideoPortalMatches.xml",
++	"modules/mul/setup/config.xml",
++	"modules/cat/select/catCategorySelect.php",
++	"modules/cat/misc/catCategory.php",
++	"modules/cat/templates/pages/forms/catCategoryForm.tpl",
++	"modules/cat/pages/forms/catEditCategoryForm.php",
++	"modules/cat/pages/forms/catAddCategoryForm.php",
++	"modules/cat/setup/config.xml",
++	"modules/sty/events/styPageShowEventHandler.php",
++	"modules/sty/misc/styBox.php",
++	"modules/sty/templates/pages/forms/styLayoutForm.tpl",
++	"modules/sty/templates/pages/forms/styBoxForm.tpl",
++	"modules/sty/templates/pages/forms/styVariantForm.tpl",
++	"modules/sty/setup/resources/lang/en.xml",
++	"modules/sty/setup/resources/lang/de.xml",
++	"modules/sty/setup/config.xml",
++	"modules/reg/misc/regRegistrationHelper.php",
++	"modules/reg/setup/config.xml",
++	"modules/not/misc/notEmailNotificationProvider.php",
++	"modules/not/setup/config.xml",
++	"modules/styfusonic/setup/config.xml",
++	"modules/sys/ajax/sysUserAutoSuggestSelectAjaxHandler.php",
++	"modules/sys/js/sysUserAutoSuggestSelect.js",
++	"modules/sys/select/sysPermissionSelect.php",
++	"modules/sys/misc/sysHtaccessConfigWriter.php",
++	"modules/sys/misc/sysUserRepository.php",
++	"modules/sys/setup/resources/lang/en.xml",
++	"modules/sys/setup/resources/lang/de.xml",
++	"modules/sys/setup/config.xml",
++	"modules/igr/boxes/igrGreatestEntriesBoxTab.php",
++	"modules/igr/boxes/igrTopRatedEntriesBoxTab.php",
++	"modules/igr/setup/config.xml",
++	"modules/rat/ajax/ratRateAjaxHandler.php",
++	"modules/rat/ajax/ratUnlikeAjaxHandler.php",
++	"modules/rat/setup/config.xml",
++	"modules/search/select/searchModuleSelect.php",
++	"modules/search/select/searchOrderSelect.php",
++	"modules/search/misc/searchResultFormatter.php",
++	"modules/search/misc/searchProviderSolr.php",
++	"modules/search/misc/searchProviderLucene.php",
++	"modules/search/misc/searchResultItem.php",
++	"modules/search/misc/searchProviderBase.php",
++	"modules/search/misc/searchIProvider.php",
++	"modules/search/templates/misc/searchResultFormatter.tpl",
++	"modules/search/templates/pages/searchIndexPage.tpl",
++	"modules/search/templates/pages/forms/searchSearchForm.tpl",
++	"modules/search/pages/forms/searchSearchForm.php",
++	"modules/search/css/searchResultFormatter.css",
++	"modules/search/setup/config/sysSettings.xml",
++	"modules/search/setup/resources/lang/en.xml",
++	"modules/search/setup/resources/lang/de.xml",
++	"modules/search/setup/config.xml",
++	"style/Fusonic/40components.css",
++	"style/_emptyDirectory",
++	"index.php",
++//	"a", // This will make the test pass	
++);
++
++// Create Phar with the filenames above
++$phar = new Phar(__DIR__ . "/bug65028.phar");
++foreach($files as $file)
++{
++	$phar->addFromString($file, "");
++}
++
++// Copy phar
++copy(__DIR__ . "/bug65028.phar", __DIR__ . "/bug65028-copy.phar");
++
++// Open phar
++try
++{
++	$phar = new Phar(__DIR__ . "/bug65028-copy.phar");
++	echo "No exception thrown.\n";
++}
++catch(UnexpectedValueException $ex)
++{
++	echo "Exception thrown: " . $ex->getMessage() . "\n";
++}
++?>
++--CLEAN--
++<?php
++@unlink(__DIR__ . "/bug65028.phar");
++@unlink(__DIR__ . "/bug65028-copy.phar");
++?>
++--EXPECT--
++No exception thrown.
++
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Track-created-curl_slist-structs-by-option-so-they-can-be-updated-in-situ.patch
+++ php5-5.4.4/debian/patches/Track-created-curl_slist-structs-by-option-so-they-can-be-updated-in-situ.patch
@@ -0,0 +1,123 @@
+commit aa7d3d8e6d8de73ebe8dd015fb5392a4bde5bfc6
+Author: Adam Harvey <aharvey@php.net>
+Date:   Mon Aug 19 11:58:57 2013 -0700
+
+    Track created curl_slist structs by option so they can be updated in situ.
+    
+    At present, when curl_setopt() is called with an option that requires the
+    creation of a curl_slist, we simply push the new curl_slist onto a list to be
+    freed when the curl handle is freed. This avoids a memory leak, but means that
+    repeated calls to curl_setopt() on the same handle with the same option wastes
+    previously allocated memory on curl_slist structs that will no longer be read.
+    
+    This commit changes the zend_llist that was previously used to track the lists
+    to a HashTable keyed by the option number, which means that we can simply
+    update the hash table each time curl_setopt() is called.
+    
+    Fixes bug #65458 (curl memory leak).
+
+--- a/NEWS
++++ b/NEWS
+@@ -53,6 +53,9 @@
+   . Fixed bug #62082 (Memory corruption in internal function 
+     get_icu_disp_value_src_php()). (Gustavo)
+ 
++- cURL:
++  . Fixed bug #65458 (curl memory leak). (Adam)
++
+ - Openssl:
+   . Fixed handling null bytes in subjectAltName (CVE-2013-4073). 
+     (Christian Heimes)
+--- a/ext/curl/interface.c
++++ b/ext/curl/interface.c
+@@ -1356,9 +1356,9 @@
+ 
+ /* {{{ curl_free_slist
+  */
+-static void curl_free_slist(void **slist)
++static void curl_free_slist(void *slist)
+ {
+-	curl_slist_free_all((struct curl_slist *) *slist);
++	curl_slist_free_all(*((struct curl_slist **) slist));
+ }
+ /* }}} */
+ 
+@@ -1426,8 +1426,10 @@
+ 	(*ch)->handlers->read->stream = NULL;
+ 
+ 	zend_llist_init(&(*ch)->to_free->str,   sizeof(char *),            (llist_dtor_func_t) curl_free_string, 0);
+-	zend_llist_init(&(*ch)->to_free->slist, sizeof(struct curl_slist), (llist_dtor_func_t) curl_free_slist,  0);
+ 	zend_llist_init(&(*ch)->to_free->post,  sizeof(struct HttpPost),   (llist_dtor_func_t) curl_free_post,   0);
++
++	(*ch)->to_free->slist = emalloc(sizeof(HashTable));
++	zend_hash_init((*ch)->to_free->slist, 4, NULL, curl_free_slist, 0);
+ }
+ /* }}} */
+ 
+@@ -1658,6 +1660,7 @@
+ 	curl_easy_setopt(dupch->cp, CURLOPT_WRITEHEADER,       (void *) dupch);
+ 	curl_easy_setopt(dupch->cp, CURLOPT_PROGRESSDATA,      (void *) dupch); 
+ 
++	efree(dupch->to_free->slist);
+ 	efree(dupch->to_free);
+ 	dupch->to_free = ch->to_free;
+ 
+@@ -2158,7 +2161,7 @@
+ 					return 1;
+ 				}
+ 			}
+-			zend_llist_add_element(&ch->to_free->slist, &slist);
++			zend_hash_index_update(ch->to_free->slist, (ulong) option, &slist, sizeof(struct curl_slist *), NULL);
+ 
+ 			error = curl_easy_setopt(ch->cp, option, slist);
+ 
+@@ -2637,8 +2640,9 @@
+ 	/* cURL destructors should be invoked only by last curl handle */
+ 	if (Z_REFCOUNT_P(ch->clone) <= 1) {
+ 		zend_llist_clean(&ch->to_free->str);
+-		zend_llist_clean(&ch->to_free->slist);
+ 		zend_llist_clean(&ch->to_free->post);
++		zend_hash_destroy(ch->to_free->slist);
++		efree(ch->to_free->slist);
+ 		efree(ch->to_free);
+ 		FREE_ZVAL(ch->clone);
+ 	} else {
+--- a/ext/curl/php_curl.h
++++ b/ext/curl/php_curl.h
+@@ -126,7 +126,7 @@
+ struct _php_curl_free {
+ 	zend_llist str;
+ 	zend_llist post;
+-	zend_llist slist;
++	HashTable *slist;
+ };
+ 
+ typedef struct {
+--- /dev/null
++++ b/ext/curl/tests/bug65458.phpt
+@@ -0,0 +1,25 @@
++--TEST--
++Bug #65458 (curl memory leak)
++--SKIPIF--
++<?php
++if (!extension_loaded('curl')) exit("skip curl extension not loaded");
++?>
++--FILE--
++<?php
++$ch = curl_init();
++$init = memory_get_usage();
++for ($i = 0; $i < 10000; $i++) {
++    curl_setopt($ch, CURLOPT_HTTPHEADER, [ "SOAPAction: getItems" ]);
++}
++
++$preclose = memory_get_usage();
++curl_close($ch);
++
++// This is a slightly tricky heuristic, but basically, we want to ensure
++// $preclose - $init has a delta in the order of bytes, not megabytes. Given
++// the number of iterations in the loop, if we're wasting memory here, we
++// should have megs and megs of extra allocations.
++var_dump(($preclose - $init) < 10000);
++?>
++--EXPECT--
++bool(true)
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/php-fpm-is-not-allowed-to-run-as-root.patch
+++ php5-5.4.4/debian/patches/php-fpm-is-not-allowed-to-run-as-root.patch
@@ -0,0 +1,124 @@
+commit 06c7c3674b5e205023de7a150d29d78c313143f8
+Author: Jerome Loyet <fat@php.net>
+Date:   Wed May 23 10:32:42 2012 +0200
+
+    - Fixed bug #61835 (php-fpm is not allowed to run as root)
+
+diff --git a/sapi/fpm/fpm/fpm.c b/sapi/fpm/fpm/fpm.c
+index 96aabbf..909902b 100644
+--- a/sapi/fpm/fpm/fpm.c
++++ b/sapi/fpm/fpm/fpm.c
+@@ -37,10 +37,11 @@ struct fpm_globals_s fpm_globals = {
+ 	.max_requests = 0,
+ 	.is_child = 0,
+ 	.test_successful = 0,
+-	.heartbeat = 0
++	.heartbeat = 0,
++	.run_as_root = 0,
+ };
+ 
+-int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int test_conf) /* {{{ */
++int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int test_conf, int run_as_root) /* {{{ */
+ {
+ 	fpm_globals.argc = argc;
+ 	fpm_globals.argv = argv;
+@@ -49,6 +50,7 @@ int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int t
+ 	}
+ 	fpm_globals.prefix = prefix;
+ 	fpm_globals.pid = pid;
++	fpm_globals.run_as_root = run_as_root;
+ 
+ 	if (0 > fpm_php_init_main()           ||
+ 	    0 > fpm_stdio_init_main()         ||
+diff --git a/sapi/fpm/fpm/fpm.h b/sapi/fpm/fpm/fpm.h
+index bfeac4d..2a69cb2 100644
+--- a/sapi/fpm/fpm/fpm.h
++++ b/sapi/fpm/fpm/fpm.h
+@@ -8,7 +8,7 @@
+ #include <unistd.h>
+ 
+ int fpm_run(int *max_requests);
+-int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int test_conf);
++int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int test_conf, int run_as_root);
+ 
+ struct fpm_globals_s {
+ 	pid_t parent_pid;
+@@ -25,6 +25,7 @@ struct fpm_globals_s {
+ 	int is_child;
+ 	int test_successful;
+ 	int heartbeat;
++	int run_as_root;
+ };
+ 
+ extern struct fpm_globals_s fpm_globals;
+diff --git a/sapi/fpm/fpm/fpm_main.c b/sapi/fpm/fpm/fpm_main.c
+index a28af53..dd48ffd 100644
+--- a/sapi/fpm/fpm/fpm_main.c
++++ b/sapi/fpm/fpm/fpm_main.c
+@@ -154,6 +154,7 @@ static const opt_struct OPTIONS[] = {
+ 	{'t', 0, "test"},
+ 	{'p', 1, "prefix"},
+ 	{'g', 1, "pid"},
++	{'R', 0, "allow-to-run-as-root"},
+ 	{'-', 0, NULL} /* end of args */
+ };
+ 
+@@ -927,6 +928,8 @@ static void php_cgi_usage(char *argv0)
+ 				"  -y, --fpm-config <file>\n"
+ 				"                   Specify alternative path to FastCGI process manager config file.\n"
+ 				"  -t, --test       Test FPM configuration and exit\n",
++				"  -R, allow-to-run-as-root\n"
++				"                   Allow pool to run as root (disabled by default)\n",
+ 				prog, PHP_PREFIX);
+ }
+ /* }}} */
+@@ -1548,6 +1551,7 @@ int main(int argc, char *argv[])
+ 	char *fpm_pid = NULL;
+ 	int test_conf = 0;
+ 	int php_information = 0;
++	int php_allow_to_run_as_root = 0;
+ 
+ #ifdef HAVE_SIGNAL_H
+ #if defined(SIGPIPE) && defined(SIG_IGN)
+@@ -1662,6 +1666,10 @@ int main(int argc, char *argv[])
+ 				php_information = 1;
+ 				break;
+ 
++			case 'R': /* allow to run as root */
++				php_allow_to_run_as_root = 1;
++				break;
++
+ 			default:
+ 			case 'h':
+ 			case '?':
+@@ -1789,7 +1797,7 @@ consult the installation file that came with this distribution, or visit \n\
+ 		}
+ 	}
+ 
+-	if (0 > fpm_init(argc, argv, fpm_config ? fpm_config : CGIG(fpm_config), fpm_prefix, fpm_pid, test_conf)) {
++	if (0 > fpm_init(argc, argv, fpm_config ? fpm_config : CGIG(fpm_config), fpm_prefix, fpm_pid, test_conf, php_allow_to_run_as_root)) {
+ 		return FAILURE;
+ 	}
+ 
+diff --git a/sapi/fpm/fpm/fpm_unix.c b/sapi/fpm/fpm/fpm_unix.c
+index 17d0b81..fb61d63 100644
+--- a/sapi/fpm/fpm/fpm_unix.c
++++ b/sapi/fpm/fpm/fpm_unix.c
+@@ -112,12 +112,12 @@ static int fpm_unix_conf_wp(struct fpm_worker_pool_s *wp) /* {{{ */
+ 			}
+ 		}
+ 
+-#ifndef I_REALLY_WANT_ROOT_PHP
+-		if (wp->set_uid == 0 || wp->set_gid == 0) {
+-			zlog(ZLOG_ERROR, "[pool %s] please specify user and group other than root", wp->config->name);
+-			return -1;
++		if (!fpm_globals.run_as_root) {
++			if (wp->set_uid == 0 || wp->set_gid == 0) {
++				zlog(ZLOG_ERROR, "[pool %s] please specify user and group other than root", wp->config->name);
++				return -1;
++			}
+ 		}
+-#endif
+ 	} else { /* not root */
+ 		if (wp->config->user && *wp->config->user) {
+ 			zlog(ZLOG_WARNING, "[pool %s] 'user' directive is ignored when FPM is not running as root", wp->config->name);
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/serialize-leaves-dangling-pointers-causes-crashes.patch
+++ php5-5.4.4/debian/patches/serialize-leaves-dangling-pointers-causes-crashes.patch
@@ -0,0 +1,37 @@
+commit f2bffdc2e48174e38a059d425953e8b1c08dd4bf
+Author: Antony Dovgal <tony2001@php.net>
+Date:   Fri Oct 26 16:36:47 2012 +0400
+
+    fix bug #63369
+    
+    (un)serialize() leaves dangling pointers, causes crashes
+
+Index: php/NEWS
+===================================================================
+--- php.orig/NEWS	2013-10-17 14:43:54.224097271 +0200
++++ php/NEWS	2013-10-17 14:43:54.336097271 +0200
+@@ -926,6 +926,8 @@
+ 
+ - Core:
+   . Fixed bug #63305 (zend_mm_heap corrupted with traits). (Dmitry, Laruence)
++  . Fixed bug #63369 ((un)serialize() leaves dangling pointers, causes crashes).
++    (Tony, Andrew Sitnikov)
+ 
+ - Fileinfo:
+   . Fixed bug #60094 (C++ comment fails in c89). (Laruence)
+Index: php/ext/standard/basic_functions.c
+===================================================================
+--- php.orig/ext/standard/basic_functions.c	2013-10-17 14:43:50.372097298 +0200
++++ php/ext/standard/basic_functions.c	2013-10-17 14:43:54.336097271 +0200
+@@ -3684,6 +3684,11 @@
+ PHP_RINIT_FUNCTION(basic) /* {{{ */
+ {
+ 	memset(BG(strtok_table), 0, 256);
++
++	BG(serialize_lock) = 0;
++	memset(&BG(serialize), 0, sizeof(BG(serialize)));
++	memset(&BG(unserialize), 0, sizeof(BG(unserialize)));
++
+ 	BG(strtok_string) = NULL;
+ 	BG(strtok_zval) = NULL;
+ 	BG(strtok_last) = NULL;
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Memory-leak-when-reusing-curl-handle.patch
+++ php5-5.4.4/debian/patches/Memory-leak-when-reusing-curl-handle.patch
@@ -0,0 +1,25 @@
+commit ac3d227e28056bf5294a8a64e2f41ce2beebaa05
+Author: Pierrick Charron <pierrick@php.net>
+Date:   Thu Dec 27 13:31:55 2012 -0500
+
+    Fixed #63859 Memory leak when reusing curl-handle
+    
+    When CURLOPT_POSTFIELDS is called more than once on the same
+    curl handle, php/curl did not free the memory of the previous
+    post data. This commit will fix the problem unless the curl
+    handle was previously duplicated using the curl_copy_handle()
+    function in which case we can not know if the post data is
+    still in use or not by any curl handle
+
+--- a/ext/curl/interface.c
++++ b/ext/curl/interface.c
+@@ -2111,6 +2111,9 @@
+ 					return 1;
+ 				}
+ 
++				if (Z_REFCOUNT_P(ch->clone) <= 1) {
++					zend_llist_clean(&ch->to_free->post);
++				}
+ 				zend_llist_add_element(&ch->to_free->post, &first);
+ 				error = curl_easy_setopt(ch->cp, CURLOPT_HTTPPOST, first);
+ 
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/SegFault-on-zend_deactivate.patch
+++ php5-5.4.4/debian/patches/SegFault-on-zend_deactivate.patch
@@ -0,0 +1,87 @@
+commit 77fffff15762137e2d8173df9b733b4cb70fc996
+Author: Dmitry Stogov <dmitry@zend.com>
+Date:   Tue May 21 09:58:11 2013 +0400
+
+    Fixed bug #64720 (SegFault on zend_deactivate)
+
+--- /dev/null
++++ b/Zend/tests/bug64720.phpt
+@@ -0,0 +1,48 @@
++--TEST--
++Bug #64720 (SegFault on zend_deactivate)
++--FILE--
++<?php
++class Stat {
++    private static $requests;
++    public static function getInstance() {
++        if (!isset(self::$requests[1])) {
++            self::$requests[1] = new self();
++        }
++        return self::$requests[1];
++    }
++    
++    public function __destruct() {
++        unset(self::$requests[1]);
++    }
++}
++
++class Foo {
++    public function __construct() {
++        Stat::getInstance();
++    }
++}
++
++class Error {
++    private $trace;
++    public function __construct() {
++        $this->trace = debug_backtrace(1);
++    }
++}
++
++class Bar {
++    public function __destruct() {
++        Stat::getInstance();
++        new Error();
++    }
++
++    public function test() {
++        new Error();
++    }
++}
++
++$foo = new Foo();
++$bar = new Bar();
++$bar->test();
++?>
++--EXPECTF--
++Fatal error: Access to undeclared static property: Stat::$requests in %sbug64720.php on line 12
+--- a/Zend/zend_object_handlers.c
++++ b/Zend/zend_object_handlers.c
+@@ -1255,6 +1255,14 @@
+ 		}
+ 	}
+ 
++	if (UNEXPECTED(CE_STATIC_MEMBERS(ce) == NULL) ||
++	    UNEXPECTED(CE_STATIC_MEMBERS(ce)[property_info->offset] == NULL)) {
++		if (!silent) {
++			zend_error_noreturn(E_ERROR, "Access to undeclared static property: %s::$%s", ce->name, property_name);
++		}
++		return NULL;
++	}
++	
+ 	return &CE_STATIC_MEMBERS(ce)[property_info->offset];
+ }
+ /* }}} */
+--- a/Zend/zend_opcode.c
++++ b/Zend/zend_opcode.c
+@@ -162,8 +162,9 @@
+ 
+ 		for (i = 0; i < ce->default_static_members_count; i++) {
+ 			if (ce->static_members_table[i]) {
+-				zval_ptr_dtor(&ce->static_members_table[i]);
++				zval *p = ce->static_members_table[i];
+ 				ce->static_members_table[i] = NULL;
++				zval_ptr_dtor(&p);
+ 			}
+ 		}
+ 		ce->static_members_table = NULL;
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Segfault-while-load-extension-failed-in-zts-build.patch
+++ php5-5.4.4/debian/patches/Segfault-while-load-extension-failed-in-zts-build.patch
@@ -0,0 +1,19 @@
+commit 4c6678d6058fd740a9e186b49f9daa72d09ed300
+Author: Xinchen Hui <laruence@php.net>
+Date:   Sat Sep 15 11:50:16 2012 +0800
+
+    Fixed bug #63093 (Segfault while load extension failed in zts-build).
+
+--- a/Zend/zend_API.c
++++ b/Zend/zend_API.c
+@@ -2265,7 +2265,9 @@
+ 	/* Deinitilaise module globals */
+ 	if (module->globals_size) {
+ #ifdef ZTS
+-		ts_free_id(*module->globals_id_ptr);
++		if (*module->globals_id_ptr) {
++			ts_free_id(*module->globals_id_ptr);
++		}
+ #else
+ 		if (module->globals_dtor) {
+ 			module->globals_dtor(module->globals_ptr TSRMLS_CC);
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.0
Source: php5
Binary: php5, php5-common, libapache2-mod-php5, libapache2-mod-php5filter, php5-cgi, php5-cli, php5-fpm, libphp5-embed, php5-dev, php5-dbg, php-pear, php5-curl, php5-enchant, php5-gd, php5-gmp, php5-imap, php5-interbase, php5-intl, php5-ldap, php5-mcrypt, php5-mysql, php5-mysqlnd, php5-odbc, php5-pgsql, php5-pspell, php5-recode, php5-snmp, php5-sqlite, php5-sybase, php5-tidy, php5-xmlrpc, php5-xsl
Architecture: any all
Version: 5.4.4-14+deb7u6
Maintainer: Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>
Uploaders: Ondřej Surý <ondrej@debian.org>, Sean Finney <seanius@debian.org>, Thijs Kinkhorst <thijs@debian.org>, Lior Kaplan <kaplan@debian.org>, William Dauchy <wdauchy@gmail.com>
Homepage: http://www.php.net/
Standards-Version: 3.9.3
Vcs-Browser: http://git.debian.org/?p=pkg-php/php.git
Vcs-Git: git://git.debian.org/pkg-php/php.git
Build-Depends: apache2-prefork-dev, autoconf (>= 2.63), automake (>= 1.11) | automake1.11, bison, chrpath, debhelper (>= 5), firebird-dev [!hurd-any !m68k !hppa !ppc64] | firebird2.5-dev [!hurd-any !m68k !hppa !ppc64] | firebird2.1-dev [!hurd-any !m68k !hppa !ppc64], flex, freetds-dev, hardening-wrapper, libapr1-dev (>= 1.2.7-8), libbz2-dev, libc-client-dev, libcurl4-openssl-dev | libcurl-dev, libdb-dev, libenchant-dev, libevent-dev (>= 1.4.11), libexpat1-dev (>= 1.95.2-2.1), libfreetype6-dev, libgcrypt11-dev, libgd2-xpm-dev, libglib2.0-dev, libgmp3-dev, libicu-dev, libjpeg-dev | libjpeg62-dev, libkrb5-dev, libldap2-dev, libmagic-dev, libmcrypt-dev, libmhash-dev (>= 0.8.8), libmysqlclient-dev | libmysqlclient15-dev, libonig-dev, libpam0g-dev, libpcre3-dev (>= 6.6), libpng-dev | libpng12-dev, libpq-dev, libpspell-dev, libqdbm-dev, librecode-dev, libsasl2-dev, libsnmp-dev, libsqlite3-dev, libssl-dev, libtidy-dev, libtool (>= 2.2), libwrap0-dev, libxmltok1-dev, libxml2-dev, libx
 slt1-dev
  (>= 1.0.18), locales-all | language-pack-de, mysql-server, netbase, netcat-traditional, quilt, re2c, unixodbc-dev, zlib1g-dev, tzdata
Build-Conflicts: bind-dev
Package-List: 
 libapache2-mod-php5 deb httpd optional
 libapache2-mod-php5filter deb httpd extra
 libphp5-embed deb php optional
 php-pear deb php optional
 php5 deb php optional
 php5-cgi deb php optional
 php5-cli deb php optional
 php5-common deb php optional
 php5-curl deb php optional
 php5-dbg deb debug extra
 php5-dev deb php optional
 php5-enchant deb php optional
 php5-fpm deb php optional
 php5-gd deb php optional
 php5-gmp deb php optional
 php5-imap deb php optional
 php5-interbase deb php optional
 php5-intl deb php optional
 php5-ldap deb php optional
 php5-mcrypt deb php optional
 php5-mysql deb php optional
 php5-mysqlnd deb php extra
 php5-odbc deb php optional
 php5-pgsql deb php optional
 php5-pspell deb php optional
 php5-recode deb php optional
 php5-snmp deb php optional
 php5-sqlite deb php optional
 php5-sybase deb php optional
 php5-tidy deb php optional
 php5-xmlrpc deb php optional
 php5-xsl deb php optional
Checksums-Sha1: 
 5b218c805078dca5925bef26bb3fb7a9cf98a940 14060505 php5_5.4.4.orig.tar.gz
 8e23b384b2a33b074020f77094b7ba35a2b0cd87 221819 php5_5.4.4-14+deb7u6.diff.gz
Checksums-Sha256: 
 0404b517ff938aca2c445fd61d10467e275acb031607cb09bf678241ba205edf 14060505 php5_5.4.4.orig.tar.gz
 7ab082d78761ab973625be4dda9f5e799d8c2676ef74e051d6db3caaac15708f 221819 php5_5.4.4-14+deb7u6.diff.gz
Files: 
 8366c3626f2275ab8c7ef5e2d6bc5bd7 14060505 php5_5.4.4.orig.tar.gz
 c633ed5b58f2d7b71e355646ed38675b 221819 php5_5.4.4-14+deb7u6.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlJmKlQACgkQ9OZqfMIN8nO9NACgkU4S81DpSzhRowLKYthla+8t
fyoAn02sriFPRgikYUX4eRv1jIswMBrQ
=u9Q4
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

1;2cFormat: 1.8
Date: Tue, 22 Oct 2013 08:33:07 +0200
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi php5-cli php5-fpm libphp5-embed php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd php5-gmp php5-imap php5-interbase php5-intl php5-ldap php5-mcrypt php5-mysql php5-mysqlnd php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source all amd64
Version: 5.4.4-14+deb7u6
Distribution: stable
Urgency: low
Maintainer: Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>
Changed-By: Ondřej Surý <ondrej@debian.org>
Description: 
 libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)
 libapache2-mod-php5filter - server-side, HTML-embedded scripting language (apache 2 filter mo
 libphp5-embed - HTML-embedded scripting language (Embedded SAPI library)
 php-pear   - PEAR - PHP Extension and Application Repository
 php5       - server-side, HTML-embedded scripting language (metapackage)
 php5-cgi   - server-side, HTML-embedded scripting language (CGI binary)
 php5-cli   - command-line interpreter for the php5 scripting language
 php5-common - Common files for packages built from the php5 source
 php5-curl  - CURL module for php5
 php5-dbg   - Debug symbols for PHP5
 php5-dev   - Files for PHP5 module development
 php5-enchant - Enchant module for php5
 php5-fpm   - server-side, HTML-embedded scripting language (FPM-CGI binary)
 php5-gd    - GD module for php5
 php5-gmp   - GMP module for php5
 php5-imap  - IMAP module for php5
 php5-interbase - interbase/firebird module for php5
 php5-intl  - internationalisation module for php5
 php5-ldap  - LDAP module for php5
 php5-mcrypt - MCrypt module for php5
 php5-mysql - MySQL module for php5
 php5-mysqlnd - MySQL module for php5 (Native Driver)
 php5-odbc  - ODBC module for php5
 php5-pgsql - PostgreSQL module for php5
 php5-pspell - pspell module for php5
 php5-recode - recode module for php5
 php5-snmp  - SNMP module for php5
 php5-sqlite - SQLite module for php5
 php5-sybase - Sybase / MS SQL Server module for php5
 php5-tidy  - tidy module for php5
 php5-xmlrpc - XML-RPC module for php5
 php5-xsl   - XSL module for php5
Closes: 725868 725890 725972 726033 726037 726295 726320 726379 726627 726633
Changes: 
 php5 (5.4.4-14+deb7u6) stable; urgency=low
 .
   [ William Dauchy ]
   * upstream fix: curl memory leak (Closes: #725868)
   * upstream fix: allow root to run php-fpm (Closes: #725899)
   * upstream fix: remove annoying warnings with php-fpm and user usage
     (Closes: #725972)
   * upstream fix: memoryleak in function declaration (Closes: #726033)
   * upstream fix: munmap() is called with the incorrect length (Closes: #726037)
   * upstream fix: segfault on zend_deactivate (Closes: #726295)
   * upstream fix: Possible null dereference (Closes: #726320)
   * upstream fix: Phar::buildFromDirectory creates corrupt archives
     (Closes: #726379)
   * upstream fix: segfault while loading extensions (Closes: #726627)
   * upstream fix: (un)serialize() leaves dangling pointers, causes crashes
     (Closes: #726633)
Checksums-Sha1: 
 27213853ec056c0313bf35e3803c4c43a51870ed 3774 php5_5.4.4-14+deb7u6.dsc
 8e23b384b2a33b074020f77094b7ba35a2b0cd87 221819 php5_5.4.4-14+deb7u6.diff.gz
 30d40dd5e2e313a6463ab43e33e78d6f322e2603 1024 php5_5.4.4-14+deb7u6_all.deb
 68ece1a226e30fc8232d7f56ae708ffb331f19e6 369230 php-pear_5.4.4-14+deb7u6_all.deb
 3a23409f5d437c72b55eb993eb1ef1727c584e0a 587484 php5-common_5.4.4-14+deb7u6_amd64.deb
 12222bfaff8287aef766915fce0cce7779e46c4c 2665566 libapache2-mod-php5_5.4.4-14+deb7u6_amd64.deb
 017dea3814793b4654ac939e15d94dc4716d67eb 2664088 libapache2-mod-php5filter_5.4.4-14+deb7u6_amd64.deb
 8b209fba3b1d74420638d12bb60923b60d2131a2 5100522 php5-cgi_5.4.4-14+deb7u6_amd64.deb
 ec58949118c38c883c38d000a3aac00a2786ac84 2557368 php5-cli_5.4.4-14+deb7u6_amd64.deb
 ae380e18da707af4b318e756f01824933d8c9a98 2590562 php5-fpm_5.4.4-14+deb7u6_amd64.deb
 1e1a4cfbcb3e40d78d1c5e1196b9cbad485427d1 2661882 libphp5-embed_5.4.4-14+deb7u6_amd64.deb
 dea862f5193f8e2030456d6280f859954205cc1b 497490 php5-dev_5.4.4-14+deb7u6_amd64.deb
 60a32f5eb7d190e5c97a1b8adc83f609f20f0616 15959918 php5-dbg_5.4.4-14+deb7u6_amd64.deb
 ea03a66a09630414212169cc796c1ee81c1f0b9a 29178 php5-curl_5.4.4-14+deb7u6_amd64.deb
 426d3f309183c297ba71d695dc751b95918f6e71 9938 php5-enchant_5.4.4-14+deb7u6_amd64.deb
 b851d24dd8e1ac1bef6ed93d4782179287f16dff 35708 php5-gd_5.4.4-14+deb7u6_amd64.deb
 d65991f53224d9d12e68eda90809d7c087f5a373 17170 php5-gmp_5.4.4-14+deb7u6_amd64.deb
 f902385ccb2bc715ec90ea64bd8f7f8f071ec650 35610 php5-imap_5.4.4-14+deb7u6_amd64.deb
 0f07dfddc794d74ae963eebab421314892bb4425 49604 php5-interbase_5.4.4-14+deb7u6_amd64.deb
 270e3504380c3cfba83b757dcddff52b91eeac81 71972 php5-intl_5.4.4-14+deb7u6_amd64.deb
 f826ab493d5376c088bf2b1ea51dfb9a543d7c6f 21770 php5-ldap_5.4.4-14+deb7u6_amd64.deb
 493fe2a06c49f333bef7da2196b989d719b79a3d 16092 php5-mcrypt_5.4.4-14+deb7u6_amd64.deb
 8d91f6eaf54773f015f1faa412b7ac19756bf3ee 80864 php5-mysql_5.4.4-14+deb7u6_amd64.deb
 8c902ce6df0aa596d84d80c73e978621f20b6be5 162734 php5-mysqlnd_5.4.4-14+deb7u6_amd64.deb
 4672f628a51d8adf0d163da23d334e3b824609b8 36414 php5-odbc_5.4.4-14+deb7u6_amd64.deb
 5e8515e32966973a1a0a66a476ae021214298d94 61068 php5-pgsql_5.4.4-14+deb7u6_amd64.deb
 33ede33481bb24df49ddceb91159404619493f63 8914 php5-pspell_5.4.4-14+deb7u6_amd64.deb
 ac8e914f745aa4ec0a7ef6129ea1eb74bbcbe783 5210 php5-recode_5.4.4-14+deb7u6_amd64.deb
 094640c590f8d067c0d455a69bd4957bb27a4d2a 21820 php5-snmp_5.4.4-14+deb7u6_amd64.deb
 1f6c4c1f677d84e436bc4ce73eca91bc37a79871 30368 php5-sqlite_5.4.4-14+deb7u6_amd64.deb
 af48a0c8de4ad83673fbb3f0e2a0c09c795df849 28448 php5-sybase_5.4.4-14+deb7u6_amd64.deb
 ec88a58598c91efc4adee093300ec0000941f17b 19608 php5-tidy_5.4.4-14+deb7u6_amd64.deb
 00be96395328772840f608a8b834c7ddb7c88eb6 36302 php5-xmlrpc_5.4.4-14+deb7u6_amd64.deb
 b14f8be72e1c282e27c0cedec1e9de695b49e5a0 15424 php5-xsl_5.4.4-14+deb7u6_amd64.deb
Checksums-Sha256: 
 7b0eb15ed5314b42dc58285bfd2dff8413417f8b7456b189c9972e881951087c 3774 php5_5.4.4-14+deb7u6.dsc
 7ab082d78761ab973625be4dda9f5e799d8c2676ef74e051d6db3caaac15708f 221819 php5_5.4.4-14+deb7u6.diff.gz
 469988ac9df5c248d590a0abb13b19400f55c5b45809a5bf89bb9f5e5a0732fc 1024 php5_5.4.4-14+deb7u6_all.deb
 ee157bf5f9559dc512bbd7e2a8d93a09dbcdd8a92148aa2cfae3c096e66e9616 369230 php-pear_5.4.4-14+deb7u6_all.deb
 ee3f90ba31ef48486186aeaf44e9964a23324822a32b832922a3bf3b9304367d 587484 php5-common_5.4.4-14+deb7u6_amd64.deb
 790dd4b83772c789c42692fbe23569324248702ed269909a1b0a17ac94ec5354 2665566 libapache2-mod-php5_5.4.4-14+deb7u6_amd64.deb
 9fc696fe8901e19000f8445429cefc4eb76d05173c731487a69fd96733ea907d 2664088 libapache2-mod-php5filter_5.4.4-14+deb7u6_amd64.deb
 86871b5f5c45730e41bfcfc8be4875dd2af8155ef6d363b3c811a1c6778f0a8a 5100522 php5-cgi_5.4.4-14+deb7u6_amd64.deb
 bf3b58bf0dd29ab414237772ac366b4326b71c16cb4d076a1b279c25db7bacf5 2557368 php5-cli_5.4.4-14+deb7u6_amd64.deb
 79f6fce24e39d6053aa0e9bfbc39379d445c236c3abd3a237aab3d74558a2fb4 2590562 php5-fpm_5.4.4-14+deb7u6_amd64.deb
 f9bed75c32010b2e3d55a1ad1516c772580797a68872aade6a8db33e31a539f4 2661882 libphp5-embed_5.4.4-14+deb7u6_amd64.deb
 6bebbfac76e64492f56465f1eb7feb224331ad9d80e003bd5502bce7b536280e 497490 php5-dev_5.4.4-14+deb7u6_amd64.deb
 de3eb3821689613b51ece4ae3ae49b6e6f3546a9a9e4d98c94453bf66e6824a8 15959918 php5-dbg_5.4.4-14+deb7u6_amd64.deb
 21a74facfa01c7fce8641c7f43da4301cfefc224248df388b90522bfb90b6cf6 29178 php5-curl_5.4.4-14+deb7u6_amd64.deb
 b3c1bea5efea0e1cf8ad4c9bdf0d76418a299e80541219eed9504ce80f982cad 9938 php5-enchant_5.4.4-14+deb7u6_amd64.deb
 0b938110d1b9cf0e2c8220c965598008a3d1c22fea9cafd2ecd9c504ff07e38a 35708 php5-gd_5.4.4-14+deb7u6_amd64.deb
 366954e2596c773da10bb0f08063c28046c0f01ed68556cf4cedef2b64d631b4 17170 php5-gmp_5.4.4-14+deb7u6_amd64.deb
 ea6f292aa2110594d7c7ceea99f695f6747c4f559ffeac514b5908f618c10510 35610 php5-imap_5.4.4-14+deb7u6_amd64.deb
 ff6f97cbc191b537c1e56df92afebd01e30279cb20fec8f521821c0b3ff2b55a 49604 php5-interbase_5.4.4-14+deb7u6_amd64.deb
 e0341f78d0804100d53f48c99b061fd7e0c6157c7ee65c8a2aad8ddbee0682f5 71972 php5-intl_5.4.4-14+deb7u6_amd64.deb
 6e5bce044fb58a11a0e252ad779895a7118491d01a83e83b3711c61a719900b2 21770 php5-ldap_5.4.4-14+deb7u6_amd64.deb
 4623a910cdc667bdb16379539294c6972afd6795122ba1281a6b6853cc94478a 16092 php5-mcrypt_5.4.4-14+deb7u6_amd64.deb
 835594f9592536c57229adc0fc59d29ac6ca02c258fb6c1aa6b8e9b13b516098 80864 php5-mysql_5.4.4-14+deb7u6_amd64.deb
 179a0218fbee8f4ef36bb46df1d5e95d1d034017f79284f9d9fe6ae22bbc8ee1 162734 php5-mysqlnd_5.4.4-14+deb7u6_amd64.deb
 504f5c5e8ced43c5ddc357a7e46f58411f4228c47d269a1778a22921b04a6aac 36414 php5-odbc_5.4.4-14+deb7u6_amd64.deb
 0618a0c85b0a171b3cb236eefd27da70f536296d49e2d6109c078f187e5ed7fb 61068 php5-pgsql_5.4.4-14+deb7u6_amd64.deb
 c7b317f950fbd494492f183952c6bb37943c959f505c5261a7bd8308a5da7381 8914 php5-pspell_5.4.4-14+deb7u6_amd64.deb
 4bd50bc07e5ae1ddcf6ce528f98e182afb6d24f5821df93835b4997b00ed4b1a 5210 php5-recode_5.4.4-14+deb7u6_amd64.deb
 e79cf1fba8ab44adef530bcfa0b4cf21f86b411383af3e0106ddd0f7794fb9a7 21820 php5-snmp_5.4.4-14+deb7u6_amd64.deb
 65ae7a31b323e5146517bf2bd7f9e4af1abe56d946d1e8bfe14e548ba62df3fd 30368 php5-sqlite_5.4.4-14+deb7u6_amd64.deb
 6b073b721881ff07fdd07fba9d60aa4f148350ac849602421e1cf39da04f1b72 28448 php5-sybase_5.4.4-14+deb7u6_amd64.deb
 1e89d7303f987d963703d4010c7937969b664cad756452b41133819793651ce6 19608 php5-tidy_5.4.4-14+deb7u6_amd64.deb
 dfab9540a0f344a969d9695f7e019921843b1f8cf72b06efe1841694fb4fa4dd 36302 php5-xmlrpc_5.4.4-14+deb7u6_amd64.deb
 7c0b85a36b609688acbb5dc4095885a6ec21c3351d19610f47e91648940fbcef 15424 php5-xsl_5.4.4-14+deb7u6_amd64.deb
Files: 
 864172cd93951fd192ef0e4fb62829bf 3774 php optional php5_5.4.4-14+deb7u6.dsc
 c633ed5b58f2d7b71e355646ed38675b 221819 php optional php5_5.4.4-14+deb7u6.diff.gz
 83bc36267abd90ab650c032ec149c40b 1024 php optional php5_5.4.4-14+deb7u6_all.deb
 c23016ae44d0450ee1e47184427603d0 369230 php optional php-pear_5.4.4-14+deb7u6_all.deb
 958e88503a3c8926c05470e8245c8574 587484 php optional php5-common_5.4.4-14+deb7u6_amd64.deb
 cd9124b1fb535d9bc1241bff2e3162f3 2665566 httpd optional libapache2-mod-php5_5.4.4-14+deb7u6_amd64.deb
 50f99e62f02c0d22befb242515671f0b 2664088 httpd extra libapache2-mod-php5filter_5.4.4-14+deb7u6_amd64.deb
 5d804935e1100227796207a382860b5d 5100522 php optional php5-cgi_5.4.4-14+deb7u6_amd64.deb
 81018eb03f81f48364a781f24c5d97f5 2557368 php optional php5-cli_5.4.4-14+deb7u6_amd64.deb
 ee8df1347f1f221a1cdf2cc2de74f16a 2590562 php optional php5-fpm_5.4.4-14+deb7u6_amd64.deb
 2c460471d512215d114ab19e531ada45 2661882 php optional libphp5-embed_5.4.4-14+deb7u6_amd64.deb
 f8ba44d89ec23c44f4423f24e5a9950a 497490 php optional php5-dev_5.4.4-14+deb7u6_amd64.deb
 04ca2fd9dffa77de43b86f4ea8e40884 15959918 debug extra php5-dbg_5.4.4-14+deb7u6_amd64.deb
 ccab6ee4b6efea63f7e95007ad4f05b2 29178 php optional php5-curl_5.4.4-14+deb7u6_amd64.deb
 5d853256d4b25b62d9b0e41ee8edcd16 9938 php optional php5-enchant_5.4.4-14+deb7u6_amd64.deb
 ad14891351b8e602559b526913c6f856 35708 php optional php5-gd_5.4.4-14+deb7u6_amd64.deb
 feb9e33e2878696800d87b953ad74aeb 17170 php optional php5-gmp_5.4.4-14+deb7u6_amd64.deb
 79be2f60c64a520840f1ba13d12e0c40 35610 php optional php5-imap_5.4.4-14+deb7u6_amd64.deb
 2eda6cafa38acbc0bc5008893dfe73d7 49604 php optional php5-interbase_5.4.4-14+deb7u6_amd64.deb
 a59d0ba7ee1dadb6e6af1197e9a7bedd 71972 php optional php5-intl_5.4.4-14+deb7u6_amd64.deb
 07d69141479dc6030ec7671ab4540c88 21770 php optional php5-ldap_5.4.4-14+deb7u6_amd64.deb
 d9318e517b399a1ba93fdd2f4701ffa2 16092 php optional php5-mcrypt_5.4.4-14+deb7u6_amd64.deb
 4de3839fa07b70a23668248eed2ca218 80864 php optional php5-mysql_5.4.4-14+deb7u6_amd64.deb
 b04cf4ae7805fd8337ee5769d81e169d 162734 php extra php5-mysqlnd_5.4.4-14+deb7u6_amd64.deb
 6a95f4fcfc0c3930a82d3336930fed9c 36414 php optional php5-odbc_5.4.4-14+deb7u6_amd64.deb
 bb028d3aa786efd168c84bff78f9cec0 61068 php optional php5-pgsql_5.4.4-14+deb7u6_amd64.deb
 23bd04da2368cbaf3ea55fdf75bd1ca6 8914 php optional php5-pspell_5.4.4-14+deb7u6_amd64.deb
 bc25574dbcf145959ca56dff0f0d3ab4 5210 php optional php5-recode_5.4.4-14+deb7u6_amd64.deb
 ef9c44ad4cf2d0268928ebd0f99e473a 21820 php optional php5-snmp_5.4.4-14+deb7u6_amd64.deb
 ff31f59fa878770c1a829742b835d493 30368 php optional php5-sqlite_5.4.4-14+deb7u6_amd64.deb
 e7d161dea6515b8674734d388aa88d54 28448 php optional php5-sybase_5.4.4-14+deb7u6_amd64.deb
 998e228aefb74a8bd49035c38ac29d84 19608 php optional php5-tidy_5.4.4-14+deb7u6_amd64.deb
 4a4b709914df0ab5fdef499d45f182c6 36302 php optional php5-xmlrpc_5.4.4-14+deb7u6_amd64.deb
 2fd9842d5aa88051cd6c7706aee74dfb 15424 php optional php5-xsl_5.4.4-14+deb7u6_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlJmKlcACgkQ9OZqfMIN8nO+zwCeK9o1GnaZ78PHKdeSNe6mJecr
hgQAn2jp/vy0g3y8ZKkc7sVB8fwu041j
=Zsmw
-----END PGP SIGNATURE-----

Reply to: