ChangeLog for: 2025-02-12 00:22:39
a/aaa_glibc-solibs-2.41-x86_64-2.txz: Rebuilt.
a/intel-microcode-20250211-noarch-1.txz: Upgraded.
a/openssl-solibs-3.4.1-x86_64-1.txz: Upgraded.
d/cargo-c-0.10.9-x86_64-1.txz: Upgraded.
l/aom-3.12.0-x86_64-1.txz: Upgraded.
l/glibc-2.41-x86_64-2.txz: Rebuilt.
The rationale we had for changing the name of ld-linux to ld really doesn't
hold water, so quit doing that.
The libthread_db library version is not 1.0 and now follows the glibc
version number. Luckily nothing uses that, and ldconfig papered over it. :-)
l/glibc-i18n-2.41-x86_64-2.txz: Rebuilt.
l/glibc-profile-2.41-x86_64-2.txz: Rebuilt.
l/librsvg-2.59.2-x86_64-2.txz: Rebuilt.
Run update-gdk-pixbuf-loaders after installing. Thanks to Petri Kaukasoina.
l/libwmf-0.2.13-x86_64-2.txz: Rebuilt.
Run update-gdk-pixbuf-loaders after installing. Thanks to Petri Kaukasoina.
l/nodejs-22.14.0-x86_64-1.txz: Upgraded.
l/python-pysol_cards-0.18.1-x86_64-1.txz: Upgraded.
Removes useless /usr/bin/pysol_cards.
n/netatalk-4.1.2-x86_64-1.txz: Upgraded.
n/openssl-3.4.1-x86_64-1.txz: Upgraded.
Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may
fail to notice that the server was not authenticated, because handshakes
don't abort as expected when the SSL_VERIFY_PEER verification mode is set.
As a result, TLS and DTLS connections using raw public keys may be
vulnerable to man-in-middle attacks when server authentication failure is
not detected by clients.
This issue was reported on 18th December 2024 by Apple Inc.
The fix was developed by Viktor Dukhovni.
For more information, see:
https://openssl-library.org/news/secadv/20250211.txt
https://www.cve.org/CVERecord?id=CVE-2024-12797
(* Security fix *)
x/libpinyin-2.10.0-x86_64-1.txz: Upgraded.
x/xkeyboard-config-2.44-noarch-1.txz: Upgraded.
extra/fltk/fltk-1.3.11-x86_64-1.txz: Upgraded.