libapache2-mod-php5 - server-side, HTML-embedded scripting language (Apache 2 module)

Distribution: Debian 7 (Wheezy)
Repository: Debian Main amd64
Package name: libapache2-mod-php5
Package version: 5.4.45
Package release: 0+deb7u2
Package architecture: amd64
Package type: deb
Installed size: 8.73 KB
Download size: 2.58 MB
Official Mirror:
This package provides the PHP5 module for the Apache 2 webserver (as found in the apache2-mpm-prefork package). Please note that this package ONLY works with Apache's prefork MPM, as it is not compiled thread-safe. The following extensions are built in: bcmath bz2 calendar Core ctype date dba dom ereg exif fileinfo filter ftp gettext hash iconv json libxml mbstring mhash openssl pcre Phar posix Reflection session shmop SimpleXML soap sockets SPL standard sysvmsg sysvsem sysvshm tokenizer wddx xml xmlreader xmlwriter zip zlib. PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML.


  • phpapi-20100525


  • libapache2-mod-php4
  • libapache2-mod-php5filter


    Source package: php5

    Install Howto

    1. Update the package index:
      # sudo apt-get update
    2. Install libapache2-mod-php5 deb package:
      # sudo apt-get install libapache2-mod-php5


    • /etc/apache2/mods-available/php5.conf
    • /etc/apache2/mods-available/php5.load
    • /etc/php5/apache2/conf.d
    • /usr/lib/apache2/modules/
    • /usr/share/doc/libapache2-mod-php5
    • /usr/share/lintian/overrides/libapache2-mod-php5


    2015-10-04 - Ondřej Surý <> php5 (5.4.45-0+deb7u2) wheezy-security; urgency=high * Merge security updates from PHP 5.5.30 into PHP 5.4.45 - Phar: . Fixed bug #69720 (Null pointer dereference in phar_get_fp_offset()). . Fixed bug #70433 (Uninitialized pointer in phar_make_dirstream when zip entry filename is "/"). * Add a notice about PHP 5.4 EOL to d/NEWS

    2015-09-07 - Ondřej Surý <> php5 (5.4.45-0+deb7u1) wheezy-security; urgency=medium * New upstream version 5.4.45 - Core: . Fixed bug #70172 (Use After Free Vulnerability in unserialize()). . Fixed bug #70219 (Use after free vulnerability in session deserializer). - EXIF: . Fixed bug #70385 (Buffer over-read in exif_read_data with TIFF IFD tag byte value of 32 bytes). - hash: . Fixed bug #70312 (HAVAL gives wrong hashes in specific cases). - PCRE: . Fixed bug #70345 (Multiple vulnerabilities related to PCRE functions). - SOAP: . Fixed bug #70388 (SOAP serialize_function_call() type confusion / RCE). - SPL: . Fixed bug #70365 (Use-after-free vulnerability in unserialize() with SplObjectStorage). . Fixed bug #70366 (Use-after-free vulnerability in unserialize() with SplDoublyLinkedList). - XSLT: . Fixed bug #69782 (NULL pointer dereference). - ZIP: . Fixed bug #70350 (ZipArchive::extractTo allows for directory traversal when creating directories). * Rebase patches on top of 5.4.45 release

    2015-08-16 - Ondřej Surý <> php5 (5.4.44-0+deb7u1) wheezy-security; urgency=medium * New upstream version 5.4.44 - Core: . Fixed bug #69793 (Remotely triggerable stack exhaustion via recursive method calls). . Fixed bug #69892 (Different arrays compare indentical due to integer key truncation). . Fixed bug #70121 (unserialize() could lead to unexpected methods execution / NULL pointer deref). - OpenSSL: . Fixed bug #70014 (openssl_random_pseudo_bytes() is not cryptographically secure). - Phar: . Improved fix for bug #69441. . Fixed bug #70019 (Files extracted from archive may be placed outside of destination directory). - SOAP: . Fixed bug #70081 (SoapClient info leak / null pointer dereference via multiple type confusions). - SPL: . Fixed bug #70068 (Dangling pointer in the unserialization of ArrayObject items). . Fixed bug #70166 (Use After Free Vulnerability in unserialize() with SPLArrayObject). . Fixed bug #70168 (Use After Free Vulnerability in unserialize() with SplObjectStorage). . Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList). * New upstream version 5.4.43 - Core: . Fixed bug #69768 (escapeshell*() doesn't cater to !). . Fixed bug #69874 (Can't set empty additional_headers for mail()), regression from fix to bug #68776. - Mysqlnd: . Fixed bug #69669 (mysqlnd is vulnerable to BACKRONYM) (CVE-2015-3152). - Phar: . Fixed bug #69958 (Segfault in Phar::convertToData on invalid file). . Fixed bug #69923 (Buffer overflow and stack smashing error in phar_fix_filepath). * Rebase patches on top of 5.4.44 release