Description:
- CVE-2013-4576: Normalize the MPIs to prevent possible side-channel
attacks
- CVE-2014-3591: Use ciphertext blinding for Elgamal to prevent
possible side-channel attacks
- CVE-2021-33560: Use of smaller K for ephemeral key in ElGamal
prevent generation of weak keys
- CVE-2021-40528: Add exponent blinding as well to mitigate
side-channel attack on mpi_powm
- tests: Add a benchmark for Elgamal
Updated packages:
-
libgcrypt-1.5.3-14.el7.tuxcare.els1.i686.rpm
sha:f8497ed9d31f9974715a42a721e0a6877b809950
-
libgcrypt-1.5.3-14.el7.tuxcare.els1.x86_64.rpm
sha:0e7241b1a1b53774b334f4fe6f9f98f54213c8eb
-
libgcrypt-devel-1.5.3-14.el7.tuxcare.els1.i686.rpm
sha:ea176ccdf06315d8724a3a3855383149a10bf5c1
-
libgcrypt-devel-1.5.3-14.el7.tuxcare.els1.x86_64.rpm
sha:242b8feb95b6795d19a51de8ebe1ffb9b80ebac5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.