Debian Package Tracker
Register | Log in
Subscribe

phpunit

Unit testing suite for PHP

Choose email to subscribe with

general
  • source: phpunit (main)
  • version: 13.0.6-2
  • maintainer: Debian PHP PEAR Maintainers (archive) (DMD)
  • uploaders: David Prévot [DMD] – Prach Pongpanich [DMD]
  • arch: all
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 9.5.2-1
  • o-o-sec: 9.5.2-1+deb11u1
  • oldstable: 9.6.7-1
  • stable: 11.5.19-1+deb13u1
  • unstable: 13.0.6-2
  • exp: 13.1.9+ds-1
versioned links
  • 9.5.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 9.5.2-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 9.6.7-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 11.5.19-1+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 13.0.6-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 13.1.9+ds-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • phpunit
action needed
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-41570: PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line arguments without neutralizing INI metacharacters. Because PHP's INI parser interprets " as a string delimiter, ; as the start of a comment, and most importantly a newline as a directive separator, a value containing a newline is parsed by the child process as multiple INI directives. An attacker able to influence a single INI value can therefore inject arbitrary additional directives into the child's configuration, including auto_prepend_file, extension, disable_functions, open_basedir, and others. Setting auto_prepend_file to an attacker-controlled path yields remote code execution in the child process. This issue has been patched in versions 12.5.22 and 13.1.6.
Created: 2026-05-09 Last update: 2026-05-10 20:03
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-41570: PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line arguments without neutralizing INI metacharacters. Because PHP's INI parser interprets " as a string delimiter, ; as the start of a comment, and most importantly a newline as a directive separator, a value containing a newline is parsed by the child process as multiple INI directives. An attacker able to influence a single INI value can therefore inject arbitrary additional directives into the child's configuration, including auto_prepend_file, extension, disable_functions, open_basedir, and others. Setting auto_prepend_file to an attacker-controlled path yields remote code execution in the child process. This issue has been patched in versions 12.5.22 and 13.1.6.
Created: 2026-05-09 Last update: 2026-05-10 20:03
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2026-41570: PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line arguments without neutralizing INI metacharacters. Because PHP's INI parser interprets " as a string delimiter, ; as the start of a comment, and most importantly a newline as a directive separator, a value containing a newline is parsed by the child process as multiple INI directives. An attacker able to influence a single INI value can therefore inject arbitrary additional directives into the child's configuration, including auto_prepend_file, extension, disable_functions, open_basedir, and others. Setting auto_prepend_file to an attacker-controlled path yields remote code execution in the child process. This issue has been patched in versions 12.5.22 and 13.1.6.
Created: 2026-05-09 Last update: 2026-05-10 20:03
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2026-41570: PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line arguments without neutralizing INI metacharacters. Because PHP's INI parser interprets " as a string delimiter, ; as the start of a comment, and most importantly a newline as a directive separator, a value containing a newline is parsed by the child process as multiple INI directives. An attacker able to influence a single INI value can therefore inject arbitrary additional directives into the child's configuration, including auto_prepend_file, extension, disable_functions, open_basedir, and others. Setting auto_prepend_file to an attacker-controlled path yields remote code execution in the child process. This issue has been patched in versions 12.5.22 and 13.1.6.
1 issue that should be fixed with the next stable update:
  • CVE-2026-24765: PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserializes code coverage files without validation, potentially allowing remote code execution if malicious `.coverage` files are present prior to the execution of the PHPT test. The vulnerability occurs when a `.coverage` file, which should not exist before test execution, is deserialized without the `allowed_classes` parameter restriction. An attacker with local file write access can place a malicious serialized object with a `__wakeup()` method into the file system, leading to arbitrary code execution during test runs with code coverage instrumentation enabled. This vulnerability requires local file write access to the location where PHPUnit stores or expects code coverage files for PHPT tests. This can occur through CI/CD pipeline attacks, the local development environment, and/or compromised dependencies. Rather than just silently sanitizing the input via `['allowed_classes' => false]`, the maintainer has chosen to make the anomalous state explicit by treating pre-existing `.coverage` files for PHPT tests as an error condition. Starting in versions in versions 12.5.8, 11.5.50, 10.5.62, 9.6.33, when a `.coverage` file is detected for a PHPT test prior to execution, PHPUnit will emit a clear error message identifying the anomalous state. Organizations can reduce the effective risk of this vulnerability through proper CI/CD configuration, including ephemeral runners, code review enforcement, branch protection, artifact isolation, and access control.
Created: 2026-05-09 Last update: 2026-05-10 20:03
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-41570: PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line arguments without neutralizing INI metacharacters. Because PHP's INI parser interprets " as a string delimiter, ; as the start of a comment, and most importantly a newline as a directive separator, a value containing a newline is parsed by the child process as multiple INI directives. An attacker able to influence a single INI value can therefore inject arbitrary additional directives into the child's configuration, including auto_prepend_file, extension, disable_functions, open_basedir, and others. Setting auto_prepend_file to an attacker-controlled path yields remote code execution in the child process. This issue has been patched in versions 12.5.22 and 13.1.6.
Created: 2026-05-09 Last update: 2026-05-09 10:00
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 5-day delay is over. Check why.
Created: 2026-05-10 Last update: 2026-05-14 15:03
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-04-06 Last update: 2026-04-10 00:30
testing migrations
  • excuses:
    • Migrates after: php-codecoverage, php-deepcopy, php-file-iterator, php-invoker, php-phar-io-manifest, php-phar-io-version, php-staabm-side-effects-detector, php-text-template, php-timer, phpab, phpunit-cli-parser, phpunit-comparator, phpunit-diff, phpunit-environment, phpunit-exporter, phpunit-global-state, phpunit-object-enumerator, phpunit-recursion-context, phpunit-type, phpunit-version
    • Migration status for phpunit (- to 13.0.6-2): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for php-imagick/3.8.0-3: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for php-text-figlet/1.0.2-6: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for phpunit/13.0.6-2: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for pkg-php-tools/1.49: amd64: Pass, arm64: Pass, i386: Pass, loong64: Test triggered, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Build-Depends(-Arch): phpunit php-codecoverage
    • ∙ ∙ Build-Depends(-Arch): phpunit php-deepcopy
    • ∙ ∙ Build-Depends(-Arch): phpunit php-file-iterator
    • ∙ ∙ Build-Depends(-Arch): phpunit php-invoker
    • ∙ ∙ Build-Depends(-Arch): phpunit php-phar-io-manifest
    • ∙ ∙ Build-Depends(-Arch): phpunit php-staabm-side-effects-detector
    • ∙ ∙ Build-Depends(-Arch): phpunit php-timer
    • ∙ ∙ Build-Depends(-Arch): phpunit phpab
    • ∙ ∙ Build-Depends(-Arch): phpunit phpunit-cli-parser
    • ∙ ∙ Build-Depends(-Arch): phpunit phpunit-comparator
    • ∙ ∙ Build-Depends(-Arch): phpunit phpunit-diff
    • ∙ ∙ Build-Depends(-Arch): phpunit phpunit-environment
    • ∙ ∙ Build-Depends(-Arch): phpunit phpunit-global-state
    • ∙ ∙ Build-Depends(-Arch): phpunit phpunit-object-enumerator
    • ∙ ∙ Build-Depends(-Arch): phpunit phpunit-recursion-context
    • ∙ ∙ Build-Depends(-Arch): phpunit phpunit-type
    • ∙ ∙ Depends: phpunit php-codecoverage
    • ∙ ∙ Depends: phpunit php-deepcopy
    • ∙ ∙ Depends: phpunit php-file-iterator
    • ∙ ∙ Depends: phpunit php-invoker
    • ∙ ∙ Depends: phpunit php-phar-io-manifest
    • ∙ ∙ Depends: phpunit php-phar-io-version
    • ∙ ∙ Depends: phpunit php-staabm-side-effects-detector
    • ∙ ∙ Depends: phpunit php-text-template
    • ∙ ∙ Depends: phpunit php-timer
    • ∙ ∙ Depends: phpunit phpunit-cli-parser
    • ∙ ∙ Depends: phpunit phpunit-comparator
    • ∙ ∙ Depends: phpunit phpunit-diff
    • ∙ ∙ Depends: phpunit phpunit-environment
    • ∙ ∙ Depends: phpunit phpunit-exporter
    • ∙ ∙ Depends: phpunit phpunit-global-state
    • ∙ ∙ Depends: phpunit phpunit-object-enumerator
    • ∙ ∙ Depends: phpunit phpunit-recursion-context
    • ∙ ∙ Depends: phpunit phpunit-type
    • ∙ ∙ Depends: phpunit phpunit-version
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/p/phpunit.html
    • ∙ ∙ Reproduced on amd64 - info
    • ∙ ∙ Reproduced on arm64 - info
    • ∙ ∙ Reproduced on armhf - info
    • ∙ ∙ Reproduced on i386 - info
    • ∙ ∙ 38 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2026-05-13] Accepted phpunit 13.1.9+ds-1 (source) into experimental (David Prévot)
  • [2026-05-11] phpunit REMOVED from testing (Debian testing watch)
  • [2026-05-02] Accepted phpunit 13.1.8+ds-1 (source) into experimental (David Prévot)
  • [2026-04-18] Accepted phpunit 13.1.7-1 (source) into experimental (David Prévot)
  • [2026-04-17] Accepted phpunit 13.1.6-1 (source) into experimental (David Prévot)
  • [2026-04-17] Accepted phpunit 13.1.5-1 (source) into experimental (David Prévot)
  • [2026-04-14] Accepted phpunit 13.1.3-1 (source) into experimental (David Prévot)
  • [2026-04-09] Accepted phpunit 13.1.1-1 (source) into experimental (David Prévot)
  • [2026-04-08] phpunit 13.0.6-2 MIGRATED to testing (Debian testing watch)
  • [2026-04-06] Accepted phpunit 13.1.0-1 (source all) into experimental (David Prévot)
  • [2026-04-06] Accepted phpunit 13.0.6-2 (source) into unstable (David Prévot)
  • [2026-04-05] Accepted phpunit 13.0.6-1 (source) into unstable (David Prévot)
  • [2026-03-03] Accepted phpunit 11.5.19-1+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: David Prévot)
  • [2026-02-23] Accepted phpunit 13.0.5-1 (source) into experimental (David Prévot)
  • [2026-02-18] phpunit 13.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2026-02-17] Accepted phpunit 13.0.3-1 (source) into experimental (David Prévot)
  • [2026-02-10] Accepted phpunit 13.0.2-1 (source) into experimental (David Prévot)
  • [2026-02-10] Accepted phpunit 13.0.0-2 (source) into unstable (David Prévot)
  • [2026-02-08] Accepted phpunit 13.0.1-1 (source) into experimental (David Prévot)
  • [2026-02-08] phpunit 12.5.9-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-06] Accepted phpunit 13.0.0-1 (source) into experimental (David Prévot)
  • [2026-02-06] Accepted phpunit 9.5.2-1+deb11u1 (source) into oldoldstable-security (Utkarsh Gupta)
  • [2026-02-05] Accepted phpunit 12.5.9-1 (source) into unstable (David Prévot)
  • [2026-01-30] phpunit 12.5.8-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-27] Accepted phpunit 12.5.8-1 (source) into unstable (David Prévot)
  • [2026-01-27] phpunit 12.5.7-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-25] Accepted phpunit 12.5.7-1 (source) into unstable (David Prévot)
  • [2026-01-20] phpunit 12.5.6-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-17] Accepted phpunit 12.5.6-1 (source) into unstable (David Prévot)
  • [2026-01-16] Accepted phpunit 12.5.5-1 (source) into unstable (David Prévot)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, exp
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 13.0.0-2ubuntu6
  • 3 bugs
  • patches for 13.0.0-2ubuntu6

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing