[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1110354: marked as done (unblock: php8.4/8.4.11-1)



Your message dated Tue, 05 Aug 2025 16:59:26 +0000
with message-id <E1ujL0Y-00Agae-3A@respighi.debian.org>
and subject line unblock php8.4
has caused the Debian Bug report #1110354,
regarding unblock: php8.4/8.4.11-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1110354: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110354
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: php8.4@packages.debian.org
Control: affects -1 + src:php8.4

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Please unblock package php8.4

[ Reason ]

As php8.4 gets updated with the upstream version via security anyway, it makes
sense to get the latest version into Trixie for the time of the release, and
minimise the next diff when there is actually a security release next time.

The list of bugs fixed is long, but TBH nothing looks like a critical bug that
**has** to be fixed.

- - Calendar:
  . Fixed jewishtojd overflow on year argument. (David Carlier)

- - Core:
  . Fixed bug GH-18833 (Use after free with weakmaps dependent on destruction
    order). (Daniil Gentili)
  . Fixed bug GH-18907 (Leak when creating cycle in hook). (ilutov)
  . Fix OSS-Fuzz #427814456. (nielsdos)
  . Fix OSS-Fuzz #428983568 and #428760800. (nielsdos)
  . Fixed bug GH-17204 (-Wuseless-escape warnings emitted by re2c). (Peter Kokot)
  . Fixed bug GH-19064 (Undefined symbol 'execute_ex' on Windows ARM64).
    (Demon)

- - Curl:
  . Fix memory leaks when returning refcounted value from curl callback.
    (nielsdos)
  . Remove incorrect string release. (nielsdos)

- - DOM:
  . Fixed bug GH-18979 (Dom\XMLDocument::createComment() triggers undefined
    behavior with null byte). (nielsdos)

- - LDAP:
  . Fixed GH-18902 ldap_exop/ldap_exop_sync assert triggered on empty
    request OID. (David Carlier)

- - MbString:
  . Fixed bug GH-18901 (integer overflow mb_split). (nielsdos)

- - Opcache:
  . Fixed bug GH-18639 (Internal class aliases can break preloading + JIT).
    (nielsdos)
  . Fixed bug GH-18899 (JIT function crash when emitting undefined variable
    warning and opline is not set yet). (nielsdos)
  . Fixed bug GH-14082 (Segmentation fault on unknown address 0x600000000018
    in ext/opcache/jit/zend_jit.c). (nielsdos)
  . Fixed bug GH-18898 (SEGV zend_jit_op_array_hot with property hooks
    and preloading). (nielsdos)

- - OpenSSL:
  . Fixed bug #80770 (It is not possible to get client peer certificate with
    stream_socket_server). (Jakub Zelenka)

- - PCNTL:
  . Fixed bug GH-18958 (Fatal error during shutdown after pcntl_rfork() or
    pcntl_forkx() with zend-max-execution-timers). (Arnaud)

- - Phar:
  . Fix stream double free in phar. (nielsdos, dixyes)
  . Fix phar crash and file corruption with SplFileObject. (nielsdos)

- - SOAP:
  . Fixed bug GH-18990, bug #81029, bug #47314 (SOAP HTTP socket not closing
    on object destruction). (nielsdos)
  . Fix memory leak when URL parsing fails in redirect. (Girgias)

- - SPL:
  . Fixed bug GH-19094 (Attaching class with no Iterator implementation to
    MultipleIterator causes crash). (nielsdos)

- - Standard:
  . Fix misleading errors in printf(). (nielsdos)
  . Fix RCN violations in array functions. (nielsdos)
  . Fixed GH-18976 pack() overflow with h/H format and INT_MAX repeater value.
    (David Carlier)

- - Streams:
  . Fixed GH-13264 (fgets() and stream_get_line() do not return false on filter
    fatal error). (Jakub Zelenka)

- - Zip:
  . Fix leak when path is too long in ZipArchive::extractTo(). (nielsdos)

[ Impact ]

This is more a reputational problem than technical one.  I've heard this many
times that Debian is outdated already when released.

[ Tests ]

There's this whole battery of upstream tests.

[ Risks ]

The usual, but given that we didn't really have many problems since we started
using upstream PHP versions for security updates, I would assess the risk is
quite low.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]

It's up to your discretion; I am not pushing this very hard, but it makes sense
to me to have this updated before the final release date.

unblock php8.4/8.4.11-1


-----BEGIN PGP SIGNATURE-----
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=nhCE
-----END PGP SIGNATURE-----

Attachment: php8.4_8.4.10-1..8.4.11-1.debdiff.xz
Description: application/xz


--- End Message ---
--- Begin Message ---
Unblocked.

--- End Message ---

Reply to: