Source: pcre2
Version: 10.47-2
Severity: important
Tags: upstream

PCRE2 breaks rpl so that it fails for many uses. It should also cause a
FTBFS, because the test suite dose not pass when rpl is built against PCRE2
10.47.

The upstream issue is here: https://github.com/PCRE2Project/pcre2/issues/846

The good news is that this should be fixed in 10.48, as there’s a patch
proposed which I have already tested.

It have not found a workaround for rpl for 10.47, so it would be good if
that version of PCRE2 didn’t make it into testing.

-- System Information:
Debian Release: trixie/sid
  APT prefers noble-updates
  APT policy: (500, 'noble-updates'), (500, 'noble-security'), (500, 'noble'), 
(100, 'noble-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.14.0-35-generic (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to