• Bug#1106691: mlmmj-php-web-admin is incompatible with PHP 8+

    From Ron Guerin@21:1/5 to All on Wed May 28 03:10:01 2025
    Package: mlmmj-php-web-admin
    Version: 1.3.0-4
    Severity: grave
    Justification: renders package unusable

    Dear Maintainer,

    Installed package, attempted to run it. Immediately dies with the following fatal errors:

    AH01071: Got error 'PHP message: PHP Fatal error: Array and string offset access syntax with curly braces is no longer supported in /usr/share/mlmmj-php-web-admin/htdo
    cs/class.rFastTemplate.php on line 477;\nStack trace:\n#0 {main}\n thrown in /usr/share/mlmmj-php-web-admin/htdocs/index.php on line 30'

    AH01071: Got error 'PHP message: PHP Fatal error: Uncaught Error: Call to undefined function each() in /usr/share/mlmmj-php-web-admin/htdocs/class.rFastTemplate.php:34
    4\nStack trace:\n#0 /usr/share/mlmmj-php-web-admin/htdocs/index.php(34): rFastTemplate->define()\n#1 {main}\n thrown in /usr/share/mlmmj-php-web-admin/htdocs/class.rFa
    stTemplate.php on line 344'

    These are PHP incompatibility errors. Between PHP 7.4 shipped with Bullseye and PHP 8.2 shipped with Bookworm, the ability to use curly braces as
    an index into strings, as well as the PHP global each() function, have been removed, rendering the code in Debian's mlmmj-php-web-admin v. 1.3 pacakge
    incompatible with the PHP version shipped with Bookworm.

    I have checked upstream, and these issues have been remediated in MLMMJ v. 1.5

    -- System Information:
    Debian Release: 12.11
    APT prefers stable-updates
    APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
    Architecture: amd64 (x86_64)

    Kernel: Linux 6.1.0-23-amd64 (SMP w/8 CPU threads; PREEMPT)
    Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8), LANGUAGE=en_US.UTF-8
    Shell: /bin/sh linked to /usr/bin/dash
    Init: systemd (via /run/systemd/system)
    LSM: AppArmor: enabled

    Versions of packages mlmmj-php-web-admin depends on:
    ii mlmmj 1.3.0-4
    ii php8.2 [php] 8.2.28-1~deb12u1

    mlmmj-php-web-admin recommends no packages.

    mlmmj-php-web-admin suggests no packages.

    -- no debconf information

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Sun Jun 8 06:10:01 2025
    This is a multi-part message in MIME format...

    Your message dated Sun, 08 Jun 2025 04:04:16 +0000
    with message-id <E1uO7Ga-003v7p-8q@fasolo.debian.org>
    and subject line Bug#1106691: fixed in mlmmj 1.5.2-1
    has caused the Debian Bug report #1106691,
    regarding mlmmj-php-web-admin is incompatible with PHP 8+
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1106691: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106691
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 28 May 2025 00:58:06 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
    (2024-03-25) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-19.1 required=4.0 tests=BAYES_00,
    BODY_INCLUDES_PACKAGE,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,
    DKIM_VALID_EF,FOURLA,HAS_PACKAGE,RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,
    RCVD_IN_VALIDITY_RPBL_BLOCKED,RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_PASS,
    T_SPF_HELO_PERMERROR,XMAILER_REPORTBUG autolearn=ham
    autolearn_force=no version=4.0.1-bugs.debian.org_2005_01_02 X-Spam-Bayes: score:0.0000 Tokens: new, 41; hammy, 150; neutral, 98; spammy,
    0. spammytokens: hammytokens:0.000-+--bookworm, 0.000-+--H*x:12.0.0,
    0.000-+--H*UA:12.0.0, 0.000-+--stable-security, 0.000-+--stablesecurity Return-path: <ron@vnetworx.net>
    Received: from zen.vnetworx.net ([86.48.29