Thanks, applied as 55a2739721f0190072b23b4799aa42d5130cbc76.

Michael

[sent from post-receive hook]

On Mon, 08 Sep 2025 09:24:12 +0200, Christian Melki 
<[email protected]> wrote:
> Security only release.
> Plugs CVEs:
> CVE-2025-58050 - A heap-buffer-overflow read vulnerability in the regular 
> expression matching engine.
> 
> Signed-off-by: Christian Melki <[email protected]>
> Message-Id: <[email protected]>
> Signed-off-by: Michael Olbrich <[email protected]>
> 
> diff --git a/rules/pcre2.make b/rules/pcre2.make
> index d8b9baf9f9e1..92c034aaa3f8 100644
> --- a/rules/pcre2.make
> +++ b/rules/pcre2.make
> @@ -14,8 +14,8 @@ PACKAGES-$(PTXCONF_PCRE2) += pcre2
>  #
>  # Paths and names
>  #
> -PCRE2_VERSION                := 10.45
> -PCRE2_MD5            := f71abbe1b5adf25cd9af5d26ef223b66
> +PCRE2_VERSION                := 10.46
> +PCRE2_MD5            := 641f99b635ebb9332a9b6a8ce8e2f3cf
>  PCRE2                        := pcre2-$(PCRE2_VERSION)
>  PCRE2_SUFFIX         := tar.bz2
>  PCRE2_URL            := 
> https://github.com/PCRE2Project/pcre2/releases/download/$(PCRE2)/$(PCRE2).$(PCRE2_SUFFIX)

Reply via email to