Thanks, applied as 55a2739721f0190072b23b4799aa42d5130cbc76. Michael
[sent from post-receive hook] On Mon, 08 Sep 2025 09:24:12 +0200, Christian Melki <[email protected]> wrote: > Security only release. > Plugs CVEs: > CVE-2025-58050 - A heap-buffer-overflow read vulnerability in the regular > expression matching engine. > > Signed-off-by: Christian Melki <[email protected]> > Message-Id: <[email protected]> > Signed-off-by: Michael Olbrich <[email protected]> > > diff --git a/rules/pcre2.make b/rules/pcre2.make > index d8b9baf9f9e1..92c034aaa3f8 100644 > --- a/rules/pcre2.make > +++ b/rules/pcre2.make > @@ -14,8 +14,8 @@ PACKAGES-$(PTXCONF_PCRE2) += pcre2 > # > # Paths and names > # > -PCRE2_VERSION := 10.45 > -PCRE2_MD5 := f71abbe1b5adf25cd9af5d26ef223b66 > +PCRE2_VERSION := 10.46 > +PCRE2_MD5 := 641f99b635ebb9332a9b6a8ce8e2f3cf > PCRE2 := pcre2-$(PCRE2_VERSION) > PCRE2_SUFFIX := tar.bz2 > PCRE2_URL := > https://github.com/PCRE2Project/pcre2/releases/download/$(PCRE2)/$(PCRE2).$(PCRE2_SUFFIX)
