[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#727087: marked as done (pu: package php5/5.4.4-14+deb7u6)



Your message dated Thu, 12 Dec 2013 11:39:00 +0100
with message-id <1386844740.890.58698313.1BB3705B@webmail.messagingengine.com>
and subject line Re: Bug#727087: Acknowledgement (pu: package php5/5.4.4-14+deb7u6)
has caused the Debian Bug report #727087,
regarding pu: package php5/5.4.4-14+deb7u6
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
727087: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727087
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: pu

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi release team,

the PHP team (well kudos go to William again) have prepared next batch
of php5 stable updates.

  * upstream fix: curl memory leak (Closes: #725868)
  * upstream fix: allow root to run php-fpm (Closes: #725890)
  * upstream fix: remove annoying warnings with php-fpm and user usage
    (Closes: #725972)
  * upstream fix: memoryleak in function declaration (Closes: #726033)
  * upstream fix: munmap() is called with the incorrect length (Closes: #726037)
  * upstream fix: segfault on zend_deactivate (Closes: #726295)
  * upstream fix: Possible null dereference (Closes: #726320)
  * upstream fix: Phar::buildFromDirectory creates corrupt archives
    (Closes: #726379)
  * upstream fix: segfault while loading extensions (Closes: #726627)
  * upstream fix: (un)serialize() leaves dangling pointers, causes crashes
    (Closes: #726633)

Debdiff is attached:

$ diffstat php5_5.4.4-14+deb7u6.debdiff
 debian/patches/Memory-leak-when-reusing-curl-handle.patch                                        |   25 +
 debian/patches/Memoryleak-when-using-the-same-variablename-2times-in-function-declaration.patch  |   41 +
 debian/patches/Phar-buildFromDirectory-creates-corrupt-archives-for-some-specific-contents.patch |  211 ++++++++++
 debian/patches/Possible-null-dereference.patch                                                   |   38 +
 debian/patches/SegFault-on-zend_deactivate.patch                                                 |   87 ++++
 debian/patches/Segfault-while-load-extension-failed-in-zts-build.patch                           |   19 
 debian/patches/Track-created-curl_slist-structs-by-option-so-they-can-be-updated-in-situ.patch   |  123 +++++
 debian/patches/Unneccesary-warnings-on-FPM.patch                                                 |  197 +++++++++
 debian/patches/munmap-is-called-with-the-incorrect-length.patch                                  |   19 
 debian/patches/php-fpm-is-not-allowed-to-run-as-root.patch                                       |  124 +++++
 debian/patches/serialize-leaves-dangling-pointers-causes-crashes.patch                           |   37 +
 php5-5.4.4/debian/changelog                                                                      |   19 
 php5-5.4.4/debian/patches/series                                                                 |   11 
 13 files changed, 951 insertions(+)

git changelog with references to upstream fixes:

commit 680847f344501c1cb1165c62756a6af79953d2c4
Author: Ondřej Surý <ondrej@sury.org>
Date:   Tue Oct 22 08:34:51 2013 +0200

    prepare 5.4.4-14+deb7u6 release

commit ff7d1c0f16e6fb70fcf7704eefca6851c95e438d
Author: William Dauchy <william@gandi.net>
Date:   Thu Oct 17 14:50:16 2013 +0200

    upstream fix: (un)serialize() leaves dangling pointers, causes crashes
    
    upstream fix f2bffdc
    fix bug #63369
    (un)serialize() leaves dangling pointers, causes crashes
    
    Closes: #726633

commit 8eeeecba89da01478eec4c7be3cea1b5061ebd7d
Author: William Dauchy <william@gandi.net>
Date:   Thu Oct 17 14:27:57 2013 +0200

    upstream fix: segfault while loading extensions
    
    upstream commit 4c6678d
    Fixed bug #63093 (Segfault while load extension failed in zts-build).
    
    Closes: #726627

commit f29a95bcb49ed756ecb03a94b175f747fd15f220
Author: William Dauchy <william@gandi.net>
Date:   Tue Oct 15 10:05:11 2013 +0200

    upstream fix: Phar::buildFromDirectory creates corrupt archives
    
    upstream commit f8efdc2
    fix bug #65028 	Phar::buildFromDirectory creates corrupt archives
    for some specific contents
    
    Closes: #726379

commit 84cb4951d88b07098ce46250f9d768cd11549ac6
Author: William Dauchy <william@gandi.net>
Date:   Mon Oct 14 16:40:50 2013 +0200

    upstream fix: Possible null dereference
    
    fix potential null dereference in fpm code
    upstream commit f08060a
    Fixed Bug #63581 Possible null dereference
    
    Closes: #726320

commit a73395d8b99228e24e4637cf33e0f8b00710c39a
Author: William Dauchy <william@gandi.net>
Date:   Mon Oct 14 09:53:48 2013 +0200

    upstream fix: segfault on zend_deactivate
    
    upstream commit 77fffff
    Fixed bug #64720 (SegFault on zend_deactivate)
    
    Closes: #726295

commit fb8eadcba6a2ba6ad13c168702c2a4421f081457
Author: William Dauchy <william@gandi.net>
Date:   Fri Oct 11 14:51:18 2013 +0200

    upstream fix: munmap() is called with the incorrect length
    
    upstream commit 433089c
    Fixed bug #62716 (munmap() is called with the incorrect length)
    
    This could lead to memory leak as well
    
    Closes: #726037

commit 49efe9843641931d93bc94fa4f9ddb80ee076b1c
Author: William Dauchy <william@gandi.net>
Date:   Fri Oct 11 14:30:00 2013 +0200

    upstream fix: memoryleak in function declaration
    
    Memoryleak when using the same variablename two times in function declaration
    upstream commit 5e9377e
    
    Closes: #726033

commit 1bb0af1d2bf209ee76bd4d4511fe1eac09233956
Author: William Dauchy <william@gandi.net>
Date:   Thu Oct 10 16:09:44 2013 +0200

    upstream fix: remove annoying warnings with php-fpm and user usage
    
    upstream commit e31553c
    - Fixed bug #62947 (Unneccesary warnings on FPM)
    
    Closes: #725972

commit bd5469f168784ad8832cd94f37204853b5cec526
Author: William Dauchy <william@gandi.net>
Date:   Wed Oct 9 19:43:19 2013 +0200

    upstream fix: allow root to run php-fpm
    
    Closes: #725891

commit 68dc168ba0d3447154ac2eb248bacdf1eb3cbda8
Author: William Dauchy <william@gandi.net>
Date:   Wed Oct 9 19:34:22 2013 +0200

    upstream fix: make sure to refresh patches to get exact match

commit 1cd1eba6099fc63b458b78fb096ca08e719e15ed
Author: William Dauchy <william@gandi.net>
Date:   Wed Oct 9 14:18:50 2013 +0200

    upstream fix: curl memory leak
    
    Fixing two memleaks using curl in php5:
    
    commit aa7d3d8 upstream
    Track created curl_slist structs by option so they can be updated in situ
    
    commit ac3d227 upstream
    Fixed #63859 Memory leak when reusing curl-handle
    
    Closes: #725868


Thank you for considering this update,
Ondrej&William

- -- System Information:
Debian Release: 7.1
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlJmLHUACgkQ9OZqfMIN8nMIywCgrY9O1c4XJcHxsk7mILgjtpU5
VD8AoIUC/fXB0djgVNaUaMxZj4qTrJD9
=Z0Hl
-----END PGP SIGNATURE-----
diff -u php5-5.4.4/debian/changelog php5-5.4.4/debian/changelog
--- php5-5.4.4/debian/changelog
+++ php5-5.4.4/debian/changelog
@@ -1,3 +1,22 @@
+php5 (5.4.4-14+deb7u6) stable; urgency=low
+
+  [ William Dauchy ]
+  * upstream fix: curl memory leak (Closes: #725868)
+  * upstream fix: allow root to run php-fpm (Closes: #725891)
+  * upstream fix: remove annoying warnings with php-fpm and user usage
+    (Closes: #725972)
+  * upstream fix: memoryleak in function declaration (Closes: #726033)
+  * upstream fix: munmap() is called with the incorrect length (Closes: #726037)
+  * upstream fix: segfault on zend_deactivate (Closes: #726295)
+  * upstream fix: Possible null dereference (Closes: #726320)
+  * upstream fix: Phar::buildFromDirectory creates corrupt archives
+    (Closes: #726379)
+  * upstream fix: segfault while loading extensions (Closes: #726627)
+  * upstream fix: (un)serialize() leaves dangling pointers, causes crashes
+    (Closes: #726633)
+
+ -- Ondřej Surý <ondrej@debian.org>  Tue, 22 Oct 2013 08:33:07 +0200
+
 php5 (5.4.4-14+deb7u5) stable; urgency=low
 
   [ William Dauchy ]
diff -u php5-5.4.4/debian/patches/series php5-5.4.4/debian/patches/series
--- php5-5.4.4/debian/patches/series
+++ php5-5.4.4/debian/patches/series
@@ -93,0 +94,11 @@
+Track-created-curl_slist-structs-by-option-so-they-can-be-updated-in-situ.patch
+Memory-leak-when-reusing-curl-handle.patch
+php-fpm-is-not-allowed-to-run-as-root.patch
+Unneccesary-warnings-on-FPM.patch
+Memoryleak-when-using-the-same-variablename-2times-in-function-declaration.patch
+munmap-is-called-with-the-incorrect-length.patch
+SegFault-on-zend_deactivate.patch
+Possible-null-dereference.patch
+Phar-buildFromDirectory-creates-corrupt-archives-for-some-specific-contents.patch
+Segfault-while-load-extension-failed-in-zts-build.patch
+serialize-leaves-dangling-pointers-causes-crashes.patch
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Possible-null-dereference.patch
+++ php5-5.4.4/debian/patches/Possible-null-dereference.patch
@@ -0,0 +1,38 @@
+commit f08060a48fadf079e860be73584ac87747dc59d6
+Author: Remi Collet <remi@php.net>
+Date:   Wed Nov 28 10:28:18 2012 +0100
+
+    Fixed Bug #63581 Possible null dereference
+    
+    Possible NULL dereference when trying to delete the single item
+    of a list (ack from fat).
+    
+    This issues where found from by static code analysis tool and,
+    so, I can't provide any reproducer.
+
+diff --git a/sapi/fpm/fpm/fpm_events.c b/sapi/fpm/fpm/fpm_events.c
+index d5f7483..d5835f0 100644
+--- a/sapi/fpm/fpm/fpm_events.c
++++ b/sapi/fpm/fpm/fpm_events.c
+@@ -188,7 +188,9 @@ static int fpm_event_queue_del(struct fpm_event_queue_s **queue, struct fpm_even
+ 			}
+ 			if (q == *queue) {
+ 				*queue = q->next;
+-				(*queue)->prev = NULL;
++				if (*queue) {
++					(*queue)->prev = NULL;
++				}
+ 			}
+ 
+ 			/* ask the event module to remove the fd from its own queue */
+@@ -432,7 +434,9 @@ void fpm_event_loop(int err) /* {{{ */
+ 						}
+ 						if (q == fpm_event_queue_timer) {
+ 							fpm_event_queue_timer = q->next;
+-							fpm_event_queue_timer->prev = NULL;
++							if (fpm_event_queue_timer) {
++								fpm_event_queue_timer->prev = NULL;
++							}
+ 						}
+ 						q = q->next;
+ 						free(q2);
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Unneccesary-warnings-on-FPM.patch
+++ php5-5.4.4/debian/patches/Unneccesary-warnings-on-FPM.patch
@@ -0,0 +1,197 @@
+commit decc394a2089b955a175aed0091044d0fc3d1aab
+Author: Jerome Loyet <fat@php.net>
+Date:   Sat May 26 18:24:08 2012 +0200
+
+    - Fixed bug #62160 (Add process.priority to set nice(2) priorities)
+
+commit e31553c2042f2a5e05d9ad1ba77b888c63e4c36f
+Author: Jerome Loyet <fat@php.net>
+Date:   Fri Sep 28 01:08:08 2012 +0200
+
+    - Fixed bug #62947 (Unneccesary warnings on FPM)
+
+--- a/sapi/fpm/fpm/fpm_conf.c
++++ b/sapi/fpm/fpm/fpm_conf.c
+@@ -70,6 +70,7 @@
+ 	.syslog_facility = -1,
+ #endif
+ 	.process_max = 0,
++	.process_priority = 64, /* 64 means unset */
+ };
+ static struct fpm_worker_pool_s *current_wp = NULL;
+ static int ini_recursion = 0;
+@@ -92,6 +93,7 @@
+ 	{ "emergency_restart_interval",  &fpm_conf_set_time,            GO(emergency_restart_interval) },
+ 	{ "process_control_timeout",     &fpm_conf_set_time,            GO(process_control_timeout) },
+ 	{ "process.max",                 &fpm_conf_set_integer,         GO(process_max) },
++	{ "process.priority",            &fpm_conf_set_integer,         GO(process_priority) },
+ 	{ "daemonize",                   &fpm_conf_set_boolean,         GO(daemonize) },
+ 	{ "rlimit_files",                &fpm_conf_set_integer,         GO(rlimit_files) },
+ 	{ "rlimit_core",                 &fpm_conf_set_rlimit_core,     GO(rlimit_core) },
+@@ -112,6 +114,7 @@
+ 	{ "listen.group",              &fpm_conf_set_string,      WPO(listen_group) },
+ 	{ "listen.mode",               &fpm_conf_set_string,      WPO(listen_mode) },
+ 	{ "listen.allowed_clients",    &fpm_conf_set_string,      WPO(listen_allowed_clients) },
++	{ "process.priority",          &fpm_conf_set_integer,     WPO(process_priority) },
+ 	{ "pm",                        &fpm_conf_set_pm,          WPO(pm) },
+ 	{ "pm.max_children",           &fpm_conf_set_integer,     WPO(pm_max_children) },
+ 	{ "pm.start_servers",          &fpm_conf_set_integer,     WPO(pm_start_servers) },
+@@ -577,6 +580,7 @@
+ 	memset(wp->config, 0, sizeof(struct fpm_worker_pool_config_s));
+ 	wp->config->listen_backlog = FPM_BACKLOG_DEFAULT;
+ 	wp->config->pm_process_idle_timeout = 10; /* 10s by default */
++	wp->config->process_priority = 64; /* 64 means unset */
+ 
+ 	if (!fpm_worker_all_pools) {
+ 		fpm_worker_all_pools = wp;
+@@ -741,6 +745,11 @@
+ 			return -1;
+ 		}
+ 
++		if (wp->config->process_priority != 64 && (wp->config->process_priority < -19 || wp->config->process_priority > 20)) {
++			zlog(ZLOG_ERROR, "[pool %s] process.priority must be included into [-19,20]", wp->config->name);
++			return -1;
++		}
++
+ 		/* pm */
+ 		if (wp->config->pm != PM_STYLE_STATIC && wp->config->pm != PM_STYLE_DYNAMIC && wp->config->pm != PM_STYLE_ONDEMAND) {
+ 			zlog(ZLOG_ALERT, "[pool %s] the process manager is missing (static, dynamic or ondemand)", wp->config->name);
+@@ -1103,6 +1112,11 @@
+ 		return -1;
+ 	}
+ 
++	if (fpm_global_config.process_priority != 64 && (fpm_global_config.process_priority < -19 || fpm_global_config.process_priority > 20)) {
++		zlog(ZLOG_ERROR, "process.priority must be included into [-19,20]");
++		return -1;
++	}
++
+ 	if (!fpm_global_config.error_log) {
+ 		fpm_global_config.error_log = strdup("log/php-fpm.log");
+ 	}
+@@ -1485,6 +1499,11 @@
+ 	zlog(ZLOG_NOTICE, "\temergency_restart_threshold = %d", fpm_global_config.emergency_restart_threshold);
+ 	zlog(ZLOG_NOTICE, "\tprocess_control_timeout = %ds",    fpm_global_config.process_control_timeout);
+ 	zlog(ZLOG_NOTICE, "\tprocess.max = %d",                 fpm_global_config.process_max);
++	if (fpm_global_config.process_priority == 64) {
++		zlog(ZLOG_NOTICE, "\tprocess.priority = undefined");
++	} else {
++		zlog(ZLOG_NOTICE, "\tprocess.priority = %d", fpm_global_config.process_priority);
++	}
+ 	zlog(ZLOG_NOTICE, "\tdaemonize = %s",                   BOOL2STR(fpm_global_config.daemonize));
+ 	zlog(ZLOG_NOTICE, "\trlimit_files = %d",                fpm_global_config.rlimit_files);
+ 	zlog(ZLOG_NOTICE, "\trlimit_core = %d",                 fpm_global_config.rlimit_core);
+@@ -1504,6 +1523,11 @@
+ 		zlog(ZLOG_NOTICE, "\tlisten.group = %s",               STR2STR(wp->config->listen_group));
+ 		zlog(ZLOG_NOTICE, "\tlisten.mode = %s",                STR2STR(wp->config->listen_mode));
+ 		zlog(ZLOG_NOTICE, "\tlisten.allowed_clients = %s",     STR2STR(wp->config->listen_allowed_clients));
++		if (wp->config->process_priority == 64) {
++			zlog(ZLOG_NOTICE, "\tprocess.priority = undefined");
++		} else {
++			zlog(ZLOG_NOTICE, "\tprocess.priority = %d", wp->config->process_priority);
++		}
+ 		zlog(ZLOG_NOTICE, "\tpm = %s",                         PM2STR(wp->config->pm));
+ 		zlog(ZLOG_NOTICE, "\tpm.max_children = %d",            wp->config->pm_max_children);
+ 		zlog(ZLOG_NOTICE, "\tpm.start_servers = %d",           wp->config->pm_start_servers);
+--- a/sapi/fpm/fpm/fpm_conf.h
++++ b/sapi/fpm/fpm/fpm_conf.h
+@@ -35,6 +35,7 @@
+ 	int emergency_restart_interval;
+ 	int process_control_timeout;
+ 	int process_max;
++	int process_priority;
+ 	int daemonize;
+ 	int rlimit_files;
+ 	int rlimit_core;
+@@ -57,6 +58,7 @@
+ 	char *listen_group;
+ 	char *listen_mode;
+ 	char *listen_allowed_clients;
++	int process_priority;
+ 	int pm;
+ 	int pm_max_children;
+ 	int pm_start_servers;
+--- a/sapi/fpm/fpm/fpm_unix.c
++++ b/sapi/fpm/fpm/fpm_unix.c
+@@ -128,6 +128,9 @@
+ 		if (wp->config->chroot && *wp->config->chroot) {
+ 			zlog(ZLOG_WARNING, "[pool %s] 'chroot' directive is ignored when FPM is not running as root", wp->config->name);
+ 		}
++		if (wp->config->process_priority != 64) {
++			zlog(ZLOG_WARNING, "[pool %s] 'process.priority' directive is ignored when FPM is not running as root", wp->config->name);
++		}
+ 
+ 		/* set up HOME and USER anyway */
+ 		pwd = getpwuid(getuid());
+@@ -183,6 +186,14 @@
+ 	}
+ 
+ 	if (is_root) {
++
++		if (wp->config->process_priority != 64) {
++			if (setpriority(PRIO_PROCESS, 0, wp->config->process_priority) < 0) {
++				zlog(ZLOG_SYSERROR, "[pool %s] Unable to set priority for this new process", wp->config->name);
++				return -1;
++			}
++		}
++
+ 		if (wp->set_gid) {
+ 			if (0 > setgid(wp->set_gid)) {
+ 				zlog(ZLOG_SYSERROR, "[pool %s] failed to setgid(%d)", wp->config->name, wp->set_gid);
+@@ -217,6 +228,7 @@
+ int fpm_unix_init_main() /* {{{ */
+ {
+ 	struct fpm_worker_pool_s *wp;
++	int is_root = !geteuid();
+ 
+ 	if (fpm_global_config.rlimit_files) {
+ 		struct rlimit r;
+@@ -259,6 +271,17 @@
+ 		return -1;
+ 	}
+ 
++	if (fpm_global_config.process_priority != 64) {
++		if (is_root) {
++			if (setpriority(PRIO_PROCESS, 0, fpm_global_config.process_priority) < 0) {
++				zlog(ZLOG_SYSERROR, "Unable to set priority for the master process");
++				return -1;
++			}
++		} else {
++			zlog(ZLOG_WARNING, "'process.priority' directive is ignored when FPM is not running as root");
++		}
++	}
++
+ 	fpm_globals.parent_pid = getpid();
+ 	for (wp = fpm_worker_all_pools; wp; wp = wp->next) {
+ 		if (0 > fpm_unix_conf_wp(wp)) {
+--- a/sapi/fpm/php-fpm.conf.in
++++ b/sapi/fpm/php-fpm.conf.in
+@@ -76,6 +76,14 @@
+ ; Default Value: 0
+ ; process.max = 128
+ 
++; Specify the nice(2) priority to apply to the master process (only if set)
++; The value can vary from -19 (highest priority) to 20 (lower priority)
++; Note: - It will only work if the FPM master process is launched as root
++;       - The pool process will inherit the master process priority
++;         unless it specified otherwise
++; Default Value: no set
++; process.priority = -19
++
+ ; Send FPM to background. Set to 'no' to keep FPM in foreground for debugging.
+ ; Default Value: yes
+ ;daemonize = yes
+@@ -167,6 +175,14 @@
+ ; Default Value: any
+ ;listen.allowed_clients = 127.0.0.1
+ 
++; Specify the nice(2) priority to apply to the pool processes (only if set)
++; The value can vary from -19 (highest priority) to 20 (lower priority)
++; Note: - It will only work if the FPM master process is launched as root
++;       - The pool processes will inherit the master process priority
++;         unless it specified otherwise
++; Default Value: no set
++; priority = -19
++
+ ; Choose how the process manager will control the number of child processes.
+ ; Possible Values:
+ ;   static  - a fixed number (pm.max_children) of child processes;
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Memoryleak-when-using-the-same-variablename-2times-in-function-declaration.patch
+++ php5-5.4.4/debian/patches/Memoryleak-when-using-the-same-variablename-2times-in-function-declaration.patch
@@ -0,0 +1,41 @@
+commit 5e9377ebd57f419de7b421878df540795ace01ef
+Author: Xinchen Hui <laruence@php.net>
+Date:   Tue Mar 26 11:44:57 2013 +0800
+
+    Fixed bug #64515 (Memoryleak when using the same variablename 2times in function declaration)
+
+--- /dev/null
++++ b/Zend/tests/bug64515.phpt
+@@ -0,0 +1,10 @@
++--TEST--
++Bug #64515 (Memoryleak when using the same variablename 2times in function declaration)
++--FILE--
++<?php
++function foo($unused = null, $unused = null, $arg = array()) {
++	    return 1;
++}
++foo();
++?>
++--EXPECT--
+--- a/Zend/zend_vm_def.h
++++ b/Zend/zend_vm_def.h
+@@ -3240,7 +3240,7 @@
+ 
+ 	zend_verify_arg_type((zend_function *) EG(active_op_array), arg_num, assignment_value, opline->extended_value TSRMLS_CC);
+ 	var_ptr = _get_zval_ptr_ptr_cv_BP_VAR_W(EX_CVs(), opline->result.var TSRMLS_CC);
+-	Z_DELREF_PP(var_ptr);
++	zval_ptr_dtor(var_ptr);
+ 	*var_ptr = assignment_value;
+ 
+ 	CHECK_EXCEPTION();
+--- a/Zend/zend_vm_execute.h
++++ b/Zend/zend_vm_execute.h
+@@ -1368,7 +1368,7 @@
+ 
+ 	zend_verify_arg_type((zend_function *) EG(active_op_array), arg_num, assignment_value, opline->extended_value TSRMLS_CC);
+ 	var_ptr = _get_zval_ptr_ptr_cv_BP_VAR_W(EX_CVs(), opline->result.var TSRMLS_CC);
+-	Z_DELREF_PP(var_ptr);
++	zval_ptr_dtor(var_ptr);
+ 	*var_ptr = assignment_value;
+ 
+ 	CHECK_EXCEPTION();
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/munmap-is-called-with-the-incorrect-length.patch
+++ php5-5.4.4/debian/patches/munmap-is-called-with-the-incorrect-length.patch
@@ -0,0 +1,19 @@
+commit 433089ccb4d4747a01d522e8678664ff17584615
+Author: Xinchen Hui <laruence@php.net>
+Date:   Thu Aug 2 12:30:07 2012 +0800
+
+    Fixed bug #62716 (munmap() is called with the incorrect length)
+
+diff --git a/Zend/zend_stream.c b/Zend/zend_stream.c
+index 5a02ecd..bc5206c 100644
+--- a/Zend/zend_stream.c
++++ b/Zend/zend_stream.c
+@@ -79,7 +79,7 @@ static size_t zend_stream_stdio_fsizer(void *handle TSRMLS_DC) /* {{{ */
+ static void zend_stream_unmap(zend_stream *stream TSRMLS_DC) { /* {{{ */
+ #if HAVE_MMAP
+ 	if (stream->mmap.map) {
+-		munmap(stream->mmap.map, stream->mmap.len);
++		munmap(stream->mmap.map, stream->mmap.len + ZEND_MMAP_AHEAD);
+ 	} else
+ #endif
+ 	if (stream->mmap.buf) {
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Phar-buildFromDirectory-creates-corrupt-archives-for-some-specific-contents.patch
+++ php5-5.4.4/debian/patches/Phar-buildFromDirectory-creates-corrupt-archives-for-some-specific-contents.patch
@@ -0,0 +1,211 @@
+commit f8efdc2b4bca2a8f7e57aae36a01df044ba3d0b5
+Author: Stanislav Malyshev <stas@php.net>
+Date:   Mon Jul 22 00:56:45 2013 -0700
+
+    fix bug #65028 	Phar::buildFromDirectory creates corrupt archives for some specific contents
+
+--- a/ext/phar/phar.c
++++ b/ext/phar/phar.c
+@@ -2579,6 +2579,7 @@
+ 	php_serialize_data_t metadata_hash;
+ 	smart_str main_metadata_str = {0};
+ 	int free_user_stub, free_fp = 1, free_ufp = 1;
++	int manifest_hack = 0;
+ 
+ 	if (phar->is_persistent) {
+ 		if (error) {
+@@ -2933,6 +2934,12 @@
+ 
+ 	manifest_len = offset + phar->alias_len + sizeof(manifest) + main_metadata_str.len;
+ 	phar_set_32(manifest, manifest_len);
++	/* Hack - see bug #65028, add padding byte to the end of the manifest */
++	if(manifest[0] == '\r' || manifest[0] == '\n') {
++		manifest_len++;
++		phar_set_32(manifest, manifest_len);
++		manifest_hack = 1;
++	}
+ 	phar_set_32(manifest+4, new_manifest_count);
+ 	if (has_dirs) {
+ 		*(manifest + 8) = (unsigned char) (((PHAR_API_VERSION) >> 8) & 0xFF);
+@@ -3055,6 +3062,22 @@
+ 			}
+ 
+ 			return EOF;
++		}
++	}
++	/* Hack - see bug #65028, add padding byte to the end of the manifest */
++	if(manifest_hack) {
++		if(1 != php_stream_write(newfile, manifest, 1)) {
++			if (closeoldfile) {
++				php_stream_close(oldfile);
++			}
++
++			php_stream_close(newfile);
++
++			if (error) {
++				spprintf(error, 0, "unable to write manifest padding byte");
++			}
++
++			return EOF;
+ 		}
+ 	}
+ 
+--- /dev/null
++++ b/ext/phar/tests/bug65028.phpt
+@@ -0,0 +1,156 @@
++--TEST--
++Phar - test specific manifest length
++--INI--
++phar.readonly=0
++--SKIPIF--
++<?php if (!extension_loaded("phar")) die("skip"); ?>
++--FILE--
++<?php
++
++$files = array(
++	"lib/widgets/Widgets.php",
++	"lib/events/FormBeginEventArgs.php",
++	"lib/events/FormEndEventArgs.php",
++	"lib/Core.php",
++	"lib/database/MySqlDatabase.php",
++	"lib/utils/DateUtil.php",
++	"js/global.js",
++	"files/_emptyDirectory",
++	"files/search/schema.xml",
++	"vendor/Fusonic/Linq/Internal/WhereIterator.php",
++	"vendor/Fusonic/Linq/Internal/SelectManyIterator.php",
++	"vendor/Fusonic/Linq/Internal/SelectIterator.php",
++	"vendor/Fusonic/Linq/Internal/DiffIterator.php",
++	"vendor/Fusonic/Linq/Internal/GroupIterator.php",
++	"vendor/Fusonic/Linq/Internal/DistinctIterator.php",
++	"vendor/Fusonic/Linq/Internal/LinqHelper.php",
++	"vendor/Fusonic/Linq/Internal/OrderIterator.php",
++	"vendor/Fusonic/Linq/Internal/IntersectIterator.php",
++	"vendor/Fusonic/Linq/GroupedLinq.php",
++	"vendor/Fusonic/Linq.php",
++	"vendor/Fusonic/UI/Widgets/Forms/FormBegin.php",
++	"vendor/Fusonic/UI/Widgets/Forms/FormSectionBuilder.php",
++	"vendor/Fusonic/UI/Widgets/Forms/AutoSelect.php",
++	"vendor/Fusonic/UI/Widgets/Forms/ControlGroup.php",
++	"vendor/Fusonic/UI/Widgets/Forms/FormEnd.php",
++	"vendor/Fusonic/UI/Widgets/WidgetBase.php",
++	"modules/calendar/ajax/calendarGetInvitedUsersContentAjaxHandler.php",
++	"modules/calendar/js/calendarAppointmentForm.js",
++	"modules/calendar/misc/calendarAppointment.php",
++	"modules/calendar/pages/forms/calendarAppointmentForm.php",
++	"modules/calendar/setup/config.xml",
++	"modules/cmt/js/cmtMicroCommentsWidget.js",
++	"modules/cmt/setup/config.xml",
++	"modules/meta/misc/metaContentHelper.php",
++	"modules/meta/setup/config.xml",
++	"modules/brd/misc/brdPostStreamFormatter.php",
++	"modules/brd/misc/brdPost.php",
++	"modules/brd/setup/config/streamContents.xml",
++	"modules/brd/setup/resources/lang/en.xml",
++	"modules/brd/setup/resources/lang/de.xml",
++	"modules/brd/setup/config.xml",
++	"modules/auth/misc/authLoginService.php",
++	"modules/auth/setup/config.xml",
++	"modules/bwd/cache/bwdWordCacheCreator.php",
++	"modules/bwd/bwd.php",
++	"modules/bwd/setup/config.xml",
++	"modules/nws/templates/pages/forms/nwsNewsForm.tpl",
++	"modules/nws/templates/pages/nwsShowNewsPage.tpl",
++	"modules/nws/pages/forms/nwsNewsForm.php",
++	"modules/nws/pages/nwsShowNewsPage.php",
++	"modules/nws/setup/config.xml",
++	"modules/gmp/cache/gmpMarkersCacheCreator.php",
++	"modules/gmp/select/gmpMapContentSelect.php",
++	"modules/gmp/templates/gmpShowAppointmentPage.tpl",
++	"modules/gmp/templates/gmpShowLinkPage.tpl",
++	"modules/gmp/setup/config.xml",
++	"modules/mul/cache/mulVideoPortalCacheCreator.php",
++	"modules/mul/misc/mulPermissionHelper.php",
++	"modules/mul/templates/widgets/mulFileEmbedWidget_Video_Flv.tpl",
++	"modules/mul/setup/config/mulUploadVideoPortalMatches.xml",
++	"modules/mul/setup/config.xml",
++	"modules/cat/select/catCategorySelect.php",
++	"modules/cat/misc/catCategory.php",
++	"modules/cat/templates/pages/forms/catCategoryForm.tpl",
++	"modules/cat/pages/forms/catEditCategoryForm.php",
++	"modules/cat/pages/forms/catAddCategoryForm.php",
++	"modules/cat/setup/config.xml",
++	"modules/sty/events/styPageShowEventHandler.php",
++	"modules/sty/misc/styBox.php",
++	"modules/sty/templates/pages/forms/styLayoutForm.tpl",
++	"modules/sty/templates/pages/forms/styBoxForm.tpl",
++	"modules/sty/templates/pages/forms/styVariantForm.tpl",
++	"modules/sty/setup/resources/lang/en.xml",
++	"modules/sty/setup/resources/lang/de.xml",
++	"modules/sty/setup/config.xml",
++	"modules/reg/misc/regRegistrationHelper.php",
++	"modules/reg/setup/config.xml",
++	"modules/not/misc/notEmailNotificationProvider.php",
++	"modules/not/setup/config.xml",
++	"modules/styfusonic/setup/config.xml",
++	"modules/sys/ajax/sysUserAutoSuggestSelectAjaxHandler.php",
++	"modules/sys/js/sysUserAutoSuggestSelect.js",
++	"modules/sys/select/sysPermissionSelect.php",
++	"modules/sys/misc/sysHtaccessConfigWriter.php",
++	"modules/sys/misc/sysUserRepository.php",
++	"modules/sys/setup/resources/lang/en.xml",
++	"modules/sys/setup/resources/lang/de.xml",
++	"modules/sys/setup/config.xml",
++	"modules/igr/boxes/igrGreatestEntriesBoxTab.php",
++	"modules/igr/boxes/igrTopRatedEntriesBoxTab.php",
++	"modules/igr/setup/config.xml",
++	"modules/rat/ajax/ratRateAjaxHandler.php",
++	"modules/rat/ajax/ratUnlikeAjaxHandler.php",
++	"modules/rat/setup/config.xml",
++	"modules/search/select/searchModuleSelect.php",
++	"modules/search/select/searchOrderSelect.php",
++	"modules/search/misc/searchResultFormatter.php",
++	"modules/search/misc/searchProviderSolr.php",
++	"modules/search/misc/searchProviderLucene.php",
++	"modules/search/misc/searchResultItem.php",
++	"modules/search/misc/searchProviderBase.php",
++	"modules/search/misc/searchIProvider.php",
++	"modules/search/templates/misc/searchResultFormatter.tpl",
++	"modules/search/templates/pages/searchIndexPage.tpl",
++	"modules/search/templates/pages/forms/searchSearchForm.tpl",
++	"modules/search/pages/forms/searchSearchForm.php",
++	"modules/search/css/searchResultFormatter.css",
++	"modules/search/setup/config/sysSettings.xml",
++	"modules/search/setup/resources/lang/en.xml",
++	"modules/search/setup/resources/lang/de.xml",
++	"modules/search/setup/config.xml",
++	"style/Fusonic/40components.css",
++	"style/_emptyDirectory",
++	"index.php",
++//	"a", // This will make the test pass	
++);
++
++// Create Phar with the filenames above
++$phar = new Phar(__DIR__ . "/bug65028.phar");
++foreach($files as $file)
++{
++	$phar->addFromString($file, "");
++}
++
++// Copy phar
++copy(__DIR__ . "/bug65028.phar", __DIR__ . "/bug65028-copy.phar");
++
++// Open phar
++try
++{
++	$phar = new Phar(__DIR__ . "/bug65028-copy.phar");
++	echo "No exception thrown.\n";
++}
++catch(UnexpectedValueException $ex)
++{
++	echo "Exception thrown: " . $ex->getMessage() . "\n";
++}
++?>
++--CLEAN--
++<?php
++@unlink(__DIR__ . "/bug65028.phar");
++@unlink(__DIR__ . "/bug65028-copy.phar");
++?>
++--EXPECT--
++No exception thrown.
++
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Track-created-curl_slist-structs-by-option-so-they-can-be-updated-in-situ.patch
+++ php5-5.4.4/debian/patches/Track-created-curl_slist-structs-by-option-so-they-can-be-updated-in-situ.patch
@@ -0,0 +1,123 @@
+commit aa7d3d8e6d8de73ebe8dd015fb5392a4bde5bfc6
+Author: Adam Harvey <aharvey@php.net>
+Date:   Mon Aug 19 11:58:57 2013 -0700
+
+    Track created curl_slist structs by option so they can be updated in situ.
+    
+    At present, when curl_setopt() is called with an option that requires the
+    creation of a curl_slist, we simply push the new curl_slist onto a list to be
+    freed when the curl handle is freed. This avoids a memory leak, but means that
+    repeated calls to curl_setopt() on the same handle with the same option wastes
+    previously allocated memory on curl_slist structs that will no longer be read.
+    
+    This commit changes the zend_llist that was previously used to track the lists
+    to a HashTable keyed by the option number, which means that we can simply
+    update the hash table each time curl_setopt() is called.
+    
+    Fixes bug #65458 (curl memory leak).
+
+--- a/NEWS
++++ b/NEWS
+@@ -53,6 +53,9 @@
+   . Fixed bug #62082 (Memory corruption in internal function 
+     get_icu_disp_value_src_php()). (Gustavo)
+ 
++- cURL:
++  . Fixed bug #65458 (curl memory leak). (Adam)
++
+ - Openssl:
+   . Fixed handling null bytes in subjectAltName (CVE-2013-4073). 
+     (Christian Heimes)
+--- a/ext/curl/interface.c
++++ b/ext/curl/interface.c
+@@ -1356,9 +1356,9 @@
+ 
+ /* {{{ curl_free_slist
+  */
+-static void curl_free_slist(void **slist)
++static void curl_free_slist(void *slist)
+ {
+-	curl_slist_free_all((struct curl_slist *) *slist);
++	curl_slist_free_all(*((struct curl_slist **) slist));
+ }
+ /* }}} */
+ 
+@@ -1426,8 +1426,10 @@
+ 	(*ch)->handlers->read->stream = NULL;
+ 
+ 	zend_llist_init(&(*ch)->to_free->str,   sizeof(char *),            (llist_dtor_func_t) curl_free_string, 0);
+-	zend_llist_init(&(*ch)->to_free->slist, sizeof(struct curl_slist), (llist_dtor_func_t) curl_free_slist,  0);
+ 	zend_llist_init(&(*ch)->to_free->post,  sizeof(struct HttpPost),   (llist_dtor_func_t) curl_free_post,   0);
++
++	(*ch)->to_free->slist = emalloc(sizeof(HashTable));
++	zend_hash_init((*ch)->to_free->slist, 4, NULL, curl_free_slist, 0);
+ }
+ /* }}} */
+ 
+@@ -1658,6 +1660,7 @@
+ 	curl_easy_setopt(dupch->cp, CURLOPT_WRITEHEADER,       (void *) dupch);
+ 	curl_easy_setopt(dupch->cp, CURLOPT_PROGRESSDATA,      (void *) dupch); 
+ 
++	efree(dupch->to_free->slist);
+ 	efree(dupch->to_free);
+ 	dupch->to_free = ch->to_free;
+ 
+@@ -2158,7 +2161,7 @@
+ 					return 1;
+ 				}
+ 			}
+-			zend_llist_add_element(&ch->to_free->slist, &slist);
++			zend_hash_index_update(ch->to_free->slist, (ulong) option, &slist, sizeof(struct curl_slist *), NULL);
+ 
+ 			error = curl_easy_setopt(ch->cp, option, slist);
+ 
+@@ -2637,8 +2640,9 @@
+ 	/* cURL destructors should be invoked only by last curl handle */
+ 	if (Z_REFCOUNT_P(ch->clone) <= 1) {
+ 		zend_llist_clean(&ch->to_free->str);
+-		zend_llist_clean(&ch->to_free->slist);
+ 		zend_llist_clean(&ch->to_free->post);
++		zend_hash_destroy(ch->to_free->slist);
++		efree(ch->to_free->slist);
+ 		efree(ch->to_free);
+ 		FREE_ZVAL(ch->clone);
+ 	} else {
+--- a/ext/curl/php_curl.h
++++ b/ext/curl/php_curl.h
+@@ -126,7 +126,7 @@
+ struct _php_curl_free {
+ 	zend_llist str;
+ 	zend_llist post;
+-	zend_llist slist;
++	HashTable *slist;
+ };
+ 
+ typedef struct {
+--- /dev/null
++++ b/ext/curl/tests/bug65458.phpt
+@@ -0,0 +1,25 @@
++--TEST--
++Bug #65458 (curl memory leak)
++--SKIPIF--
++<?php
++if (!extension_loaded('curl')) exit("skip curl extension not loaded");
++?>
++--FILE--
++<?php
++$ch = curl_init();
++$init = memory_get_usage();
++for ($i = 0; $i < 10000; $i++) {
++    curl_setopt($ch, CURLOPT_HTTPHEADER, [ "SOAPAction: getItems" ]);
++}
++
++$preclose = memory_get_usage();
++curl_close($ch);
++
++// This is a slightly tricky heuristic, but basically, we want to ensure
++// $preclose - $init has a delta in the order of bytes, not megabytes. Given
++// the number of iterations in the loop, if we're wasting memory here, we
++// should have megs and megs of extra allocations.
++var_dump(($preclose - $init) < 10000);
++?>
++--EXPECT--
++bool(true)
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/php-fpm-is-not-allowed-to-run-as-root.patch
+++ php5-5.4.4/debian/patches/php-fpm-is-not-allowed-to-run-as-root.patch
@@ -0,0 +1,124 @@
+commit 06c7c3674b5e205023de7a150d29d78c313143f8
+Author: Jerome Loyet <fat@php.net>
+Date:   Wed May 23 10:32:42 2012 +0200
+
+    - Fixed bug #61835 (php-fpm is not allowed to run as root)
+
+diff --git a/sapi/fpm/fpm/fpm.c b/sapi/fpm/fpm/fpm.c
+index 96aabbf..909902b 100644
+--- a/sapi/fpm/fpm/fpm.c
++++ b/sapi/fpm/fpm/fpm.c
+@@ -37,10 +37,11 @@ struct fpm_globals_s fpm_globals = {
+ 	.max_requests = 0,
+ 	.is_child = 0,
+ 	.test_successful = 0,
+-	.heartbeat = 0
++	.heartbeat = 0,
++	.run_as_root = 0,
+ };
+ 
+-int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int test_conf) /* {{{ */
++int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int test_conf, int run_as_root) /* {{{ */
+ {
+ 	fpm_globals.argc = argc;
+ 	fpm_globals.argv = argv;
+@@ -49,6 +50,7 @@ int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int t
+ 	}
+ 	fpm_globals.prefix = prefix;
+ 	fpm_globals.pid = pid;
++	fpm_globals.run_as_root = run_as_root;
+ 
+ 	if (0 > fpm_php_init_main()           ||
+ 	    0 > fpm_stdio_init_main()         ||
+diff --git a/sapi/fpm/fpm/fpm.h b/sapi/fpm/fpm/fpm.h
+index bfeac4d..2a69cb2 100644
+--- a/sapi/fpm/fpm/fpm.h
++++ b/sapi/fpm/fpm/fpm.h
+@@ -8,7 +8,7 @@
+ #include <unistd.h>
+ 
+ int fpm_run(int *max_requests);
+-int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int test_conf);
++int fpm_init(int argc, char **argv, char *config, char *prefix, char *pid, int test_conf, int run_as_root);
+ 
+ struct fpm_globals_s {
+ 	pid_t parent_pid;
+@@ -25,6 +25,7 @@ struct fpm_globals_s {
+ 	int is_child;
+ 	int test_successful;
+ 	int heartbeat;
++	int run_as_root;
+ };
+ 
+ extern struct fpm_globals_s fpm_globals;
+diff --git a/sapi/fpm/fpm/fpm_main.c b/sapi/fpm/fpm/fpm_main.c
+index a28af53..dd48ffd 100644
+--- a/sapi/fpm/fpm/fpm_main.c
++++ b/sapi/fpm/fpm/fpm_main.c
+@@ -154,6 +154,7 @@ static const opt_struct OPTIONS[] = {
+ 	{'t', 0, "test"},
+ 	{'p', 1, "prefix"},
+ 	{'g', 1, "pid"},
++	{'R', 0, "allow-to-run-as-root"},
+ 	{'-', 0, NULL} /* end of args */
+ };
+ 
+@@ -927,6 +928,8 @@ static void php_cgi_usage(char *argv0)
+ 				"  -y, --fpm-config <file>\n"
+ 				"                   Specify alternative path to FastCGI process manager config file.\n"
+ 				"  -t, --test       Test FPM configuration and exit\n",
++				"  -R, allow-to-run-as-root\n"
++				"                   Allow pool to run as root (disabled by default)\n",
+ 				prog, PHP_PREFIX);
+ }
+ /* }}} */
+@@ -1548,6 +1551,7 @@ int main(int argc, char *argv[])
+ 	char *fpm_pid = NULL;
+ 	int test_conf = 0;
+ 	int php_information = 0;
++	int php_allow_to_run_as_root = 0;
+ 
+ #ifdef HAVE_SIGNAL_H
+ #if defined(SIGPIPE) && defined(SIG_IGN)
+@@ -1662,6 +1666,10 @@ int main(int argc, char *argv[])
+ 				php_information = 1;
+ 				break;
+ 
++			case 'R': /* allow to run as root */
++				php_allow_to_run_as_root = 1;
++				break;
++
+ 			default:
+ 			case 'h':
+ 			case '?':
+@@ -1789,7 +1797,7 @@ consult the installation file that came with this distribution, or visit \n\
+ 		}
+ 	}
+ 
+-	if (0 > fpm_init(argc, argv, fpm_config ? fpm_config : CGIG(fpm_config), fpm_prefix, fpm_pid, test_conf)) {
++	if (0 > fpm_init(argc, argv, fpm_config ? fpm_config : CGIG(fpm_config), fpm_prefix, fpm_pid, test_conf, php_allow_to_run_as_root)) {
+ 		return FAILURE;
+ 	}
+ 
+diff --git a/sapi/fpm/fpm/fpm_unix.c b/sapi/fpm/fpm/fpm_unix.c
+index 17d0b81..fb61d63 100644
+--- a/sapi/fpm/fpm/fpm_unix.c
++++ b/sapi/fpm/fpm/fpm_unix.c
+@@ -112,12 +112,12 @@ static int fpm_unix_conf_wp(struct fpm_worker_pool_s *wp) /* {{{ */
+ 			}
+ 		}
+ 
+-#ifndef I_REALLY_WANT_ROOT_PHP
+-		if (wp->set_uid == 0 || wp->set_gid == 0) {
+-			zlog(ZLOG_ERROR, "[pool %s] please specify user and group other than root", wp->config->name);
+-			return -1;
++		if (!fpm_globals.run_as_root) {
++			if (wp->set_uid == 0 || wp->set_gid == 0) {
++				zlog(ZLOG_ERROR, "[pool %s] please specify user and group other than root", wp->config->name);
++				return -1;
++			}
+ 		}
+-#endif
+ 	} else { /* not root */
+ 		if (wp->config->user && *wp->config->user) {
+ 			zlog(ZLOG_WARNING, "[pool %s] 'user' directive is ignored when FPM is not running as root", wp->config->name);
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/serialize-leaves-dangling-pointers-causes-crashes.patch
+++ php5-5.4.4/debian/patches/serialize-leaves-dangling-pointers-causes-crashes.patch
@@ -0,0 +1,37 @@
+commit f2bffdc2e48174e38a059d425953e8b1c08dd4bf
+Author: Antony Dovgal <tony2001@php.net>
+Date:   Fri Oct 26 16:36:47 2012 +0400
+
+    fix bug #63369
+    
+    (un)serialize() leaves dangling pointers, causes crashes
+
+Index: php/NEWS
+===================================================================
+--- php.orig/NEWS	2013-10-17 14:43:54.224097271 +0200
++++ php/NEWS	2013-10-17 14:43:54.336097271 +0200
+@@ -926,6 +926,8 @@
+ 
+ - Core:
+   . Fixed bug #63305 (zend_mm_heap corrupted with traits). (Dmitry, Laruence)
++  . Fixed bug #63369 ((un)serialize() leaves dangling pointers, causes crashes).
++    (Tony, Andrew Sitnikov)
+ 
+ - Fileinfo:
+   . Fixed bug #60094 (C++ comment fails in c89). (Laruence)
+Index: php/ext/standard/basic_functions.c
+===================================================================
+--- php.orig/ext/standard/basic_functions.c	2013-10-17 14:43:50.372097298 +0200
++++ php/ext/standard/basic_functions.c	2013-10-17 14:43:54.336097271 +0200
+@@ -3684,6 +3684,11 @@
+ PHP_RINIT_FUNCTION(basic) /* {{{ */
+ {
+ 	memset(BG(strtok_table), 0, 256);
++
++	BG(serialize_lock) = 0;
++	memset(&BG(serialize), 0, sizeof(BG(serialize)));
++	memset(&BG(unserialize), 0, sizeof(BG(unserialize)));
++
+ 	BG(strtok_string) = NULL;
+ 	BG(strtok_zval) = NULL;
+ 	BG(strtok_last) = NULL;
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Memory-leak-when-reusing-curl-handle.patch
+++ php5-5.4.4/debian/patches/Memory-leak-when-reusing-curl-handle.patch
@@ -0,0 +1,25 @@
+commit ac3d227e28056bf5294a8a64e2f41ce2beebaa05
+Author: Pierrick Charron <pierrick@php.net>
+Date:   Thu Dec 27 13:31:55 2012 -0500
+
+    Fixed #63859 Memory leak when reusing curl-handle
+    
+    When CURLOPT_POSTFIELDS is called more than once on the same
+    curl handle, php/curl did not free the memory of the previous
+    post data. This commit will fix the problem unless the curl
+    handle was previously duplicated using the curl_copy_handle()
+    function in which case we can not know if the post data is
+    still in use or not by any curl handle
+
+--- a/ext/curl/interface.c
++++ b/ext/curl/interface.c
+@@ -2111,6 +2111,9 @@
+ 					return 1;
+ 				}
+ 
++				if (Z_REFCOUNT_P(ch->clone) <= 1) {
++					zend_llist_clean(&ch->to_free->post);
++				}
+ 				zend_llist_add_element(&ch->to_free->post, &first);
+ 				error = curl_easy_setopt(ch->cp, CURLOPT_HTTPPOST, first);
+ 
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/SegFault-on-zend_deactivate.patch
+++ php5-5.4.4/debian/patches/SegFault-on-zend_deactivate.patch
@@ -0,0 +1,87 @@
+commit 77fffff15762137e2d8173df9b733b4cb70fc996
+Author: Dmitry Stogov <dmitry@zend.com>
+Date:   Tue May 21 09:58:11 2013 +0400
+
+    Fixed bug #64720 (SegFault on zend_deactivate)
+
+--- /dev/null
++++ b/Zend/tests/bug64720.phpt
+@@ -0,0 +1,48 @@
++--TEST--
++Bug #64720 (SegFault on zend_deactivate)
++--FILE--
++<?php
++class Stat {
++    private static $requests;
++    public static function getInstance() {
++        if (!isset(self::$requests[1])) {
++            self::$requests[1] = new self();
++        }
++        return self::$requests[1];
++    }
++    
++    public function __destruct() {
++        unset(self::$requests[1]);
++    }
++}
++
++class Foo {
++    public function __construct() {
++        Stat::getInstance();
++    }
++}
++
++class Error {
++    private $trace;
++    public function __construct() {
++        $this->trace = debug_backtrace(1);
++    }
++}
++
++class Bar {
++    public function __destruct() {
++        Stat::getInstance();
++        new Error();
++    }
++
++    public function test() {
++        new Error();
++    }
++}
++
++$foo = new Foo();
++$bar = new Bar();
++$bar->test();
++?>
++--EXPECTF--
++Fatal error: Access to undeclared static property: Stat::$requests in %sbug64720.php on line 12
+--- a/Zend/zend_object_handlers.c
++++ b/Zend/zend_object_handlers.c
+@@ -1255,6 +1255,14 @@
+ 		}
+ 	}
+ 
++	if (UNEXPECTED(CE_STATIC_MEMBERS(ce) == NULL) ||
++	    UNEXPECTED(CE_STATIC_MEMBERS(ce)[property_info->offset] == NULL)) {
++		if (!silent) {
++			zend_error_noreturn(E_ERROR, "Access to undeclared static property: %s::$%s", ce->name, property_name);
++		}
++		return NULL;
++	}
++	
+ 	return &CE_STATIC_MEMBERS(ce)[property_info->offset];
+ }
+ /* }}} */
+--- a/Zend/zend_opcode.c
++++ b/Zend/zend_opcode.c
+@@ -162,8 +162,9 @@
+ 
+ 		for (i = 0; i < ce->default_static_members_count; i++) {
+ 			if (ce->static_members_table[i]) {
+-				zval_ptr_dtor(&ce->static_members_table[i]);
++				zval *p = ce->static_members_table[i];
+ 				ce->static_members_table[i] = NULL;
++				zval_ptr_dtor(&p);
+ 			}
+ 		}
+ 		ce->static_members_table = NULL;
only in patch2:
unchanged:
--- php5-5.4.4.orig/debian/patches/Segfault-while-load-extension-failed-in-zts-build.patch
+++ php5-5.4.4/debian/patches/Segfault-while-load-extension-failed-in-zts-build.patch
@@ -0,0 +1,19 @@
+commit 4c6678d6058fd740a9e186b49f9daa72d09ed300
+Author: Xinchen Hui <laruence@php.net>
+Date:   Sat Sep 15 11:50:16 2012 +0800
+
+    Fixed bug #63093 (Segfault while load extension failed in zts-build).
+
+--- a/Zend/zend_API.c
++++ b/Zend/zend_API.c
+@@ -2265,7 +2265,9 @@
+ 	/* Deinitilaise module globals */
+ 	if (module->globals_size) {
+ #ifdef ZTS
+-		ts_free_id(*module->globals_id_ptr);
++		if (*module->globals_id_ptr) {
++			ts_free_id(*module->globals_id_ptr);
++		}
+ #else
+ 		if (module->globals_dtor) {
+ 			module->globals_dtor(module->globals_ptr TSRMLS_CC);
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.0
Source: php5
Binary: php5, php5-common, libapache2-mod-php5, libapache2-mod-php5filter, php5-cgi, php5-cli, php5-fpm, libphp5-embed, php5-dev, php5-dbg, php-pear, php5-curl, php5-enchant, php5-gd, php5-gmp, php5-imap, php5-interbase, php5-intl, php5-ldap, php5-mcrypt, php5-mysql, php5-mysqlnd, php5-odbc, php5-pgsql, php5-pspell, php5-recode, php5-snmp, php5-sqlite, php5-sybase, php5-tidy, php5-xmlrpc, php5-xsl
Architecture: any all
Version: 5.4.4-14+deb7u6
Maintainer: Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>
Uploaders: Ondřej Surý <ondrej@debian.org>, Sean Finney <seanius@debian.org>, Thijs Kinkhorst <thijs@debian.org>, Lior Kaplan <kaplan@debian.org>, William Dauchy <wdauchy@gmail.com>
Homepage: http://www.php.net/
Standards-Version: 3.9.3
Vcs-Browser: http://git.debian.org/?p=pkg-php/php.git
Vcs-Git: git://git.debian.org/pkg-php/php.git
Build-Depends: apache2-prefork-dev, autoconf (>= 2.63), automake (>= 1.11) | automake1.11, bison, chrpath, debhelper (>= 5), firebird-dev [!hurd-any !m68k !hppa !ppc64] | firebird2.5-dev [!hurd-any !m68k !hppa !ppc64] | firebird2.1-dev [!hurd-any !m68k !hppa !ppc64], flex, freetds-dev, hardening-wrapper, libapr1-dev (>= 1.2.7-8), libbz2-dev, libc-client-dev, libcurl4-openssl-dev | libcurl-dev, libdb-dev, libenchant-dev, libevent-dev (>= 1.4.11), libexpat1-dev (>= 1.95.2-2.1), libfreetype6-dev, libgcrypt11-dev, libgd2-xpm-dev, libglib2.0-dev, libgmp3-dev, libicu-dev, libjpeg-dev | libjpeg62-dev, libkrb5-dev, libldap2-dev, libmagic-dev, libmcrypt-dev, libmhash-dev (>= 0.8.8), libmysqlclient-dev | libmysqlclient15-dev, libonig-dev, libpam0g-dev, libpcre3-dev (>= 6.6), libpng-dev | libpng12-dev, libpq-dev, libpspell-dev, libqdbm-dev, librecode-dev, libsasl2-dev, libsnmp-dev, libsqlite3-dev, libssl-dev, libtidy-dev, libtool (>= 2.2), libwrap0-dev, libxmltok1-dev, libxml2-dev, libx
 slt1-dev
  (>= 1.0.18), locales-all | language-pack-de, mysql-server, netbase, netcat-traditional, quilt, re2c, unixodbc-dev, zlib1g-dev, tzdata
Build-Conflicts: bind-dev
Package-List: 
 libapache2-mod-php5 deb httpd optional
 libapache2-mod-php5filter deb httpd extra
 libphp5-embed deb php optional
 php-pear deb php optional
 php5 deb php optional
 php5-cgi deb php optional
 php5-cli deb php optional
 php5-common deb php optional
 php5-curl deb php optional
 php5-dbg deb debug extra
 php5-dev deb php optional
 php5-enchant deb php optional
 php5-fpm deb php optional
 php5-gd deb php optional
 php5-gmp deb php optional
 php5-imap deb php optional
 php5-interbase deb php optional
 php5-intl deb php optional
 php5-ldap deb php optional
 php5-mcrypt deb php optional
 php5-mysql deb php optional
 php5-mysqlnd deb php extra
 php5-odbc deb php optional
 php5-pgsql deb php optional
 php5-pspell deb php optional
 php5-recode deb php optional
 php5-snmp deb php optional
 php5-sqlite deb php optional
 php5-sybase deb php optional
 php5-tidy deb php optional
 php5-xmlrpc deb php optional
 php5-xsl deb php optional
Checksums-Sha1: 
 5b218c805078dca5925bef26bb3fb7a9cf98a940 14060505 php5_5.4.4.orig.tar.gz
 8e23b384b2a33b074020f77094b7ba35a2b0cd87 221819 php5_5.4.4-14+deb7u6.diff.gz
Checksums-Sha256: 
 0404b517ff938aca2c445fd61d10467e275acb031607cb09bf678241ba205edf 14060505 php5_5.4.4.orig.tar.gz
 7ab082d78761ab973625be4dda9f5e799d8c2676ef74e051d6db3caaac15708f 221819 php5_5.4.4-14+deb7u6.diff.gz
Files: 
 8366c3626f2275ab8c7ef5e2d6bc5bd7 14060505 php5_5.4.4.orig.tar.gz
 c633ed5b58f2d7b71e355646ed38675b 221819 php5_5.4.4-14+deb7u6.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlJmKlQACgkQ9OZqfMIN8nO9NACgkU4S81DpSzhRowLKYthla+8t
fyoAn02sriFPRgikYUX4eRv1jIswMBrQ
=u9Q4
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

1;2cFormat: 1.8
Date: Tue, 22 Oct 2013 08:33:07 +0200
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi php5-cli php5-fpm libphp5-embed php5-dev php5-dbg php-pear php5-curl php5-enchant php5-gd php5-gmp php5-imap php5-interbase php5-intl php5-ldap php5-mcrypt php5-mysql php5-mysqlnd php5-odbc php5-pgsql php5-pspell php5-recode php5-snmp php5-sqlite php5-sybase php5-tidy php5-xmlrpc php5-xsl
Architecture: source all amd64
Version: 5.4.4-14+deb7u6
Distribution: stable
Urgency: low
Maintainer: Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>
Changed-By: Ondřej Surý <ondrej@debian.org>
Description: 
 libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)
 libapache2-mod-php5filter - server-side, HTML-embedded scripting language (apache 2 filter mo
 libphp5-embed - HTML-embedded scripting language (Embedded SAPI library)
 php-pear   - PEAR - PHP Extension and Application Repository
 php5       - server-side, HTML-embedded scripting language (metapackage)
 php5-cgi   - server-side, HTML-embedded scripting language (CGI binary)
 php5-cli   - command-line interpreter for the php5 scripting language
 php5-common - Common files for packages built from the php5 source
 php5-curl  - CURL module for php5
 php5-dbg   - Debug symbols for PHP5
 php5-dev   - Files for PHP5 module development
 php5-enchant - Enchant module for php5
 php5-fpm   - server-side, HTML-embedded scripting language (FPM-CGI binary)
 php5-gd    - GD module for php5
 php5-gmp   - GMP module for php5
 php5-imap  - IMAP module for php5
 php5-interbase - interbase/firebird module for php5
 php5-intl  - internationalisation module for php5
 php5-ldap  - LDAP module for php5
 php5-mcrypt - MCrypt module for php5
 php5-mysql - MySQL module for php5
 php5-mysqlnd - MySQL module for php5 (Native Driver)
 php5-odbc  - ODBC module for php5
 php5-pgsql - PostgreSQL module for php5
 php5-pspell - pspell module for php5
 php5-recode - recode module for php5
 php5-snmp  - SNMP module for php5
 php5-sqlite - SQLite module for php5
 php5-sybase - Sybase / MS SQL Server module for php5
 php5-tidy  - tidy module for php5
 php5-xmlrpc - XML-RPC module for php5
 php5-xsl   - XSL module for php5
Closes: 725868 725890 725972 726033 726037 726295 726320 726379 726627 726633
Changes: 
 php5 (5.4.4-14+deb7u6) stable; urgency=low
 .
   [ William Dauchy ]
   * upstream fix: curl memory leak (Closes: #725868)
   * upstream fix: allow root to run php-fpm (Closes: #725899)
   * upstream fix: remove annoying warnings with php-fpm and user usage
     (Closes: #725972)
   * upstream fix: memoryleak in function declaration (Closes: #726033)
   * upstream fix: munmap() is called with the incorrect length (Closes: #726037)
   * upstream fix: segfault on zend_deactivate (Closes: #726295)
   * upstream fix: Possible null dereference (Closes: #726320)
   * upstream fix: Phar::buildFromDirectory creates corrupt archives
     (Closes: #726379)
   * upstream fix: segfault while loading extensions (Closes: #726627)
   * upstream fix: (un)serialize() leaves dangling pointers, causes crashes
     (Closes: #726633)
Checksums-Sha1: 
 27213853ec056c0313bf35e3803c4c43a51870ed 3774 php5_5.4.4-14+deb7u6.dsc
 8e23b384b2a33b074020f77094b7ba35a2b0cd87 221819 php5_5.4.4-14+deb7u6.diff.gz
 30d40dd5e2e313a6463ab43e33e78d6f322e2603 1024 php5_5.4.4-14+deb7u6_all.deb
 68ece1a226e30fc8232d7f56ae708ffb331f19e6 369230 php-pear_5.4.4-14+deb7u6_all.deb
 3a23409f5d437c72b55eb993eb1ef1727c584e0a 587484 php5-common_5.4.4-14+deb7u6_amd64.deb
 12222bfaff8287aef766915fce0cce7779e46c4c 2665566 libapache2-mod-php5_5.4.4-14+deb7u6_amd64.deb
 017dea3814793b4654ac939e15d94dc4716d67eb 2664088 libapache2-mod-php5filter_5.4.4-14+deb7u6_amd64.deb
 8b209fba3b1d74420638d12bb60923b60d2131a2 5100522 php5-cgi_5.4.4-14+deb7u6_amd64.deb
 ec58949118c38c883c38d000a3aac00a2786ac84 2557368 php5-cli_5.4.4-14+deb7u6_amd64.deb
 ae380e18da707af4b318e756f01824933d8c9a98 2590562 php5-fpm_5.4.4-14+deb7u6_amd64.deb
 1e1a4cfbcb3e40d78d1c5e1196b9cbad485427d1 2661882 libphp5-embed_5.4.4-14+deb7u6_amd64.deb
 dea862f5193f8e2030456d6280f859954205cc1b 497490 php5-dev_5.4.4-14+deb7u6_amd64.deb
 60a32f5eb7d190e5c97a1b8adc83f609f20f0616 15959918 php5-dbg_5.4.4-14+deb7u6_amd64.deb
 ea03a66a09630414212169cc796c1ee81c1f0b9a 29178 php5-curl_5.4.4-14+deb7u6_amd64.deb
 426d3f309183c297ba71d695dc751b95918f6e71 9938 php5-enchant_5.4.4-14+deb7u6_amd64.deb
 b851d24dd8e1ac1bef6ed93d4782179287f16dff 35708 php5-gd_5.4.4-14+deb7u6_amd64.deb
 d65991f53224d9d12e68eda90809d7c087f5a373 17170 php5-gmp_5.4.4-14+deb7u6_amd64.deb
 f902385ccb2bc715ec90ea64bd8f7f8f071ec650 35610 php5-imap_5.4.4-14+deb7u6_amd64.deb
 0f07dfddc794d74ae963eebab421314892bb4425 49604 php5-interbase_5.4.4-14+deb7u6_amd64.deb
 270e3504380c3cfba83b757dcddff52b91eeac81 71972 php5-intl_5.4.4-14+deb7u6_amd64.deb
 f826ab493d5376c088bf2b1ea51dfb9a543d7c6f 21770 php5-ldap_5.4.4-14+deb7u6_amd64.deb
 493fe2a06c49f333bef7da2196b989d719b79a3d 16092 php5-mcrypt_5.4.4-14+deb7u6_amd64.deb
 8d91f6eaf54773f015f1faa412b7ac19756bf3ee 80864 php5-mysql_5.4.4-14+deb7u6_amd64.deb
 8c902ce6df0aa596d84d80c73e978621f20b6be5 162734 php5-mysqlnd_5.4.4-14+deb7u6_amd64.deb
 4672f628a51d8adf0d163da23d334e3b824609b8 36414 php5-odbc_5.4.4-14+deb7u6_amd64.deb
 5e8515e32966973a1a0a66a476ae021214298d94 61068 php5-pgsql_5.4.4-14+deb7u6_amd64.deb
 33ede33481bb24df49ddceb91159404619493f63 8914 php5-pspell_5.4.4-14+deb7u6_amd64.deb
 ac8e914f745aa4ec0a7ef6129ea1eb74bbcbe783 5210 php5-recode_5.4.4-14+deb7u6_amd64.deb
 094640c590f8d067c0d455a69bd4957bb27a4d2a 21820 php5-snmp_5.4.4-14+deb7u6_amd64.deb
 1f6c4c1f677d84e436bc4ce73eca91bc37a79871 30368 php5-sqlite_5.4.4-14+deb7u6_amd64.deb
 af48a0c8de4ad83673fbb3f0e2a0c09c795df849 28448 php5-sybase_5.4.4-14+deb7u6_amd64.deb
 ec88a58598c91efc4adee093300ec0000941f17b 19608 php5-tidy_5.4.4-14+deb7u6_amd64.deb
 00be96395328772840f608a8b834c7ddb7c88eb6 36302 php5-xmlrpc_5.4.4-14+deb7u6_amd64.deb
 b14f8be72e1c282e27c0cedec1e9de695b49e5a0 15424 php5-xsl_5.4.4-14+deb7u6_amd64.deb
Checksums-Sha256: 
 7b0eb15ed5314b42dc58285bfd2dff8413417f8b7456b189c9972e881951087c 3774 php5_5.4.4-14+deb7u6.dsc
 7ab082d78761ab973625be4dda9f5e799d8c2676ef74e051d6db3caaac15708f 221819 php5_5.4.4-14+deb7u6.diff.gz
 469988ac9df5c248d590a0abb13b19400f55c5b45809a5bf89bb9f5e5a0732fc 1024 php5_5.4.4-14+deb7u6_all.deb
 ee157bf5f9559dc512bbd7e2a8d93a09dbcdd8a92148aa2cfae3c096e66e9616 369230 php-pear_5.4.4-14+deb7u6_all.deb
 ee3f90ba31ef48486186aeaf44e9964a23324822a32b832922a3bf3b9304367d 587484 php5-common_5.4.4-14+deb7u6_amd64.deb
 790dd4b83772c789c42692fbe23569324248702ed269909a1b0a17ac94ec5354 2665566 libapache2-mod-php5_5.4.4-14+deb7u6_amd64.deb
 9fc696fe8901e19000f8445429cefc4eb76d05173c731487a69fd96733ea907d 2664088 libapache2-mod-php5filter_5.4.4-14+deb7u6_amd64.deb
 86871b5f5c45730e41bfcfc8be4875dd2af8155ef6d363b3c811a1c6778f0a8a 5100522 php5-cgi_5.4.4-14+deb7u6_amd64.deb
 bf3b58bf0dd29ab414237772ac366b4326b71c16cb4d076a1b279c25db7bacf5 2557368 php5-cli_5.4.4-14+deb7u6_amd64.deb
 79f6fce24e39d6053aa0e9bfbc39379d445c236c3abd3a237aab3d74558a2fb4 2590562 php5-fpm_5.4.4-14+deb7u6_amd64.deb
 f9bed75c32010b2e3d55a1ad1516c772580797a68872aade6a8db33e31a539f4 2661882 libphp5-embed_5.4.4-14+deb7u6_amd64.deb
 6bebbfac76e64492f56465f1eb7feb224331ad9d80e003bd5502bce7b536280e 497490 php5-dev_5.4.4-14+deb7u6_amd64.deb
 de3eb3821689613b51ece4ae3ae49b6e6f3546a9a9e4d98c94453bf66e6824a8 15959918 php5-dbg_5.4.4-14+deb7u6_amd64.deb
 21a74facfa01c7fce8641c7f43da4301cfefc224248df388b90522bfb90b6cf6 29178 php5-curl_5.4.4-14+deb7u6_amd64.deb
 b3c1bea5efea0e1cf8ad4c9bdf0d76418a299e80541219eed9504ce80f982cad 9938 php5-enchant_5.4.4-14+deb7u6_amd64.deb
 0b938110d1b9cf0e2c8220c965598008a3d1c22fea9cafd2ecd9c504ff07e38a 35708 php5-gd_5.4.4-14+deb7u6_amd64.deb
 366954e2596c773da10bb0f08063c28046c0f01ed68556cf4cedef2b64d631b4 17170 php5-gmp_5.4.4-14+deb7u6_amd64.deb
 ea6f292aa2110594d7c7ceea99f695f6747c4f559ffeac514b5908f618c10510 35610 php5-imap_5.4.4-14+deb7u6_amd64.deb
 ff6f97cbc191b537c1e56df92afebd01e30279cb20fec8f521821c0b3ff2b55a 49604 php5-interbase_5.4.4-14+deb7u6_amd64.deb
 e0341f78d0804100d53f48c99b061fd7e0c6157c7ee65c8a2aad8ddbee0682f5 71972 php5-intl_5.4.4-14+deb7u6_amd64.deb
 6e5bce044fb58a11a0e252ad779895a7118491d01a83e83b3711c61a719900b2 21770 php5-ldap_5.4.4-14+deb7u6_amd64.deb
 4623a910cdc667bdb16379539294c6972afd6795122ba1281a6b6853cc94478a 16092 php5-mcrypt_5.4.4-14+deb7u6_amd64.deb
 835594f9592536c57229adc0fc59d29ac6ca02c258fb6c1aa6b8e9b13b516098 80864 php5-mysql_5.4.4-14+deb7u6_amd64.deb
 179a0218fbee8f4ef36bb46df1d5e95d1d034017f79284f9d9fe6ae22bbc8ee1 162734 php5-mysqlnd_5.4.4-14+deb7u6_amd64.deb
 504f5c5e8ced43c5ddc357a7e46f58411f4228c47d269a1778a22921b04a6aac 36414 php5-odbc_5.4.4-14+deb7u6_amd64.deb
 0618a0c85b0a171b3cb236eefd27da70f536296d49e2d6109c078f187e5ed7fb 61068 php5-pgsql_5.4.4-14+deb7u6_amd64.deb
 c7b317f950fbd494492f183952c6bb37943c959f505c5261a7bd8308a5da7381 8914 php5-pspell_5.4.4-14+deb7u6_amd64.deb
 4bd50bc07e5ae1ddcf6ce528f98e182afb6d24f5821df93835b4997b00ed4b1a 5210 php5-recode_5.4.4-14+deb7u6_amd64.deb
 e79cf1fba8ab44adef530bcfa0b4cf21f86b411383af3e0106ddd0f7794fb9a7 21820 php5-snmp_5.4.4-14+deb7u6_amd64.deb
 65ae7a31b323e5146517bf2bd7f9e4af1abe56d946d1e8bfe14e548ba62df3fd 30368 php5-sqlite_5.4.4-14+deb7u6_amd64.deb
 6b073b721881ff07fdd07fba9d60aa4f148350ac849602421e1cf39da04f1b72 28448 php5-sybase_5.4.4-14+deb7u6_amd64.deb
 1e89d7303f987d963703d4010c7937969b664cad756452b41133819793651ce6 19608 php5-tidy_5.4.4-14+deb7u6_amd64.deb
 dfab9540a0f344a969d9695f7e019921843b1f8cf72b06efe1841694fb4fa4dd 36302 php5-xmlrpc_5.4.4-14+deb7u6_amd64.deb
 7c0b85a36b609688acbb5dc4095885a6ec21c3351d19610f47e91648940fbcef 15424 php5-xsl_5.4.4-14+deb7u6_amd64.deb
Files: 
 864172cd93951fd192ef0e4fb62829bf 3774 php optional php5_5.4.4-14+deb7u6.dsc
 c633ed5b58f2d7b71e355646ed38675b 221819 php optional php5_5.4.4-14+deb7u6.diff.gz
 83bc36267abd90ab650c032ec149c40b 1024 php optional php5_5.4.4-14+deb7u6_all.deb
 c23016ae44d0450ee1e47184427603d0 369230 php optional php-pear_5.4.4-14+deb7u6_all.deb
 958e88503a3c8926c05470e8245c8574 587484 php optional php5-common_5.4.4-14+deb7u6_amd64.deb
 cd9124b1fb535d9bc1241bff2e3162f3 2665566 httpd optional libapache2-mod-php5_5.4.4-14+deb7u6_amd64.deb
 50f99e62f02c0d22befb242515671f0b 2664088 httpd extra libapache2-mod-php5filter_5.4.4-14+deb7u6_amd64.deb
 5d804935e1100227796207a382860b5d 5100522 php optional php5-cgi_5.4.4-14+deb7u6_amd64.deb
 81018eb03f81f48364a781f24c5d97f5 2557368 php optional php5-cli_5.4.4-14+deb7u6_amd64.deb
 ee8df1347f1f221a1cdf2cc2de74f16a 2590562 php optional php5-fpm_5.4.4-14+deb7u6_amd64.deb
 2c460471d512215d114ab19e531ada45 2661882 php optional libphp5-embed_5.4.4-14+deb7u6_amd64.deb
 f8ba44d89ec23c44f4423f24e5a9950a 497490 php optional php5-dev_5.4.4-14+deb7u6_amd64.deb
 04ca2fd9dffa77de43b86f4ea8e40884 15959918 debug extra php5-dbg_5.4.4-14+deb7u6_amd64.deb
 ccab6ee4b6efea63f7e95007ad4f05b2 29178 php optional php5-curl_5.4.4-14+deb7u6_amd64.deb
 5d853256d4b25b62d9b0e41ee8edcd16 9938 php optional php5-enchant_5.4.4-14+deb7u6_amd64.deb
 ad14891351b8e602559b526913c6f856 35708 php optional php5-gd_5.4.4-14+deb7u6_amd64.deb
 feb9e33e2878696800d87b953ad74aeb 17170 php optional php5-gmp_5.4.4-14+deb7u6_amd64.deb
 79be2f60c64a520840f1ba13d12e0c40 35610 php optional php5-imap_5.4.4-14+deb7u6_amd64.deb
 2eda6cafa38acbc0bc5008893dfe73d7 49604 php optional php5-interbase_5.4.4-14+deb7u6_amd64.deb
 a59d0ba7ee1dadb6e6af1197e9a7bedd 71972 php optional php5-intl_5.4.4-14+deb7u6_amd64.deb
 07d69141479dc6030ec7671ab4540c88 21770 php optional php5-ldap_5.4.4-14+deb7u6_amd64.deb
 d9318e517b399a1ba93fdd2f4701ffa2 16092 php optional php5-mcrypt_5.4.4-14+deb7u6_amd64.deb
 4de3839fa07b70a23668248eed2ca218 80864 php optional php5-mysql_5.4.4-14+deb7u6_amd64.deb
 b04cf4ae7805fd8337ee5769d81e169d 162734 php extra php5-mysqlnd_5.4.4-14+deb7u6_amd64.deb
 6a95f4fcfc0c3930a82d3336930fed9c 36414 php optional php5-odbc_5.4.4-14+deb7u6_amd64.deb
 bb028d3aa786efd168c84bff78f9cec0 61068 php optional php5-pgsql_5.4.4-14+deb7u6_amd64.deb
 23bd04da2368cbaf3ea55fdf75bd1ca6 8914 php optional php5-pspell_5.4.4-14+deb7u6_amd64.deb
 bc25574dbcf145959ca56dff0f0d3ab4 5210 php optional php5-recode_5.4.4-14+deb7u6_amd64.deb
 ef9c44ad4cf2d0268928ebd0f99e473a 21820 php optional php5-snmp_5.4.4-14+deb7u6_amd64.deb
 ff31f59fa878770c1a829742b835d493 30368 php optional php5-sqlite_5.4.4-14+deb7u6_amd64.deb
 e7d161dea6515b8674734d388aa88d54 28448 php optional php5-sybase_5.4.4-14+deb7u6_amd64.deb
 998e228aefb74a8bd49035c38ac29d84 19608 php optional php5-tidy_5.4.4-14+deb7u6_amd64.deb
 4a4b709914df0ab5fdef499d45f182c6 36302 php optional php5-xmlrpc_5.4.4-14+deb7u6_amd64.deb
 2fd9842d5aa88051cd6c7706aee74dfb 15424 php optional php5-xsl_5.4.4-14+deb7u6_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlJmKlcACgkQ9OZqfMIN8nO+zwCeK9o1GnaZ78PHKdeSNe6mJecr
hgQAn2jp/vy0g3y8ZKkc7sVB8fwu041j
=Zsmw
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Version: php5/5.4.4-14+deb7u7

Uploaded as part of today's security upload.

Ondrej

On Tue, Oct 22, 2013, at 8:45, Debian Bug Tracking System wrote:
> Thank you for filing a new Bug report with Debian.
> 
> This is an automatically generated reply to let you know your message
> has been received.
> 
> Your message is being forwarded to the package maintainers and other
> interested parties for their attention; they will reply in due course.
> 
> Your message has been sent to the package maintainer(s):
>  Debian Release Team <debian-release@lists.debian.org>
> 
> If you wish to submit further information on this problem, please
> send it to 727087@bugs.debian.org.
> 
> Please do not send mail to owner@bugs.debian.org unless you wish
> to report a problem with the Bug-tracking system.
> 
> -- 
> 727087: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727087
> Debian Bug Tracking System
> Contact owner@bugs.debian.org with problems


-- 
Ondřej Surý <ondrej@sury.org>
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server

--- End Message ---

Reply to: