Source: pcre2 Version: 10.47-2 Severity: important Tags: upstream PCRE2 breaks rpl so that it fails for many uses. It should also cause a FTBFS, because the test suite dose not pass when rpl is built against PCRE2 10.47.
The upstream issue is here: https://github.com/PCRE2Project/pcre2/issues/846 The good news is that this should be fixed in 10.48, as there’s a patch proposed which I have already tested. It have not found a workaround for rpl for 10.47, so it would be good if that version of PCRE2 didn’t make it into testing. -- System Information: Debian Release: trixie/sid APT prefers noble-updates APT policy: (500, 'noble-updates'), (500, 'noble-security'), (500, 'noble'), (100, 'noble-backports') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.14.0-35-generic (SMP w/16 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled

