Release date:
2025-07-07 11:47:56 UTC
Description:
- CVE-2024-13176: fix timing side-channel in ECDSA signature computation
Updated packages:
-
openssl-1.1.1k-12.el8.tuxcare.els2.x86_64.rpm
sha:f8c1f2038dd627783f9d9bc700ca12e849541f20d9c9bcc58af949b17ca160a3
-
openssl-devel-1.1.1k-12.el8.tuxcare.els2.i686.rpm
sha:e4a4f47121a1f8f91d22cbca7e6e322216324aa83ac5e56f9dd6236b146f8592
-
openssl-devel-1.1.1k-12.el8.tuxcare.els2.x86_64.rpm
sha:7b6890a69457bab7d495999c28c4c5940d8f692a7633638aad7223175c467e28
-
openssl-libs-1.1.1k-12.el8.tuxcare.els2.i686.rpm
sha:230aea51865b7a880baf085c470f048601858e665f84703855936fe5b383569b
-
openssl-libs-1.1.1k-12.el8.tuxcare.els2.x86_64.rpm
sha:bd06c4a730b75dc845e621bea5ee2f60f36d70c609c51e24cc815f6850482a4a
-
openssl-perl-1.1.1k-12.el8.tuxcare.els2.x86_64.rpm
sha:4e8c670fec8c1864d4f7d63f62faa229da6594f2e33e9990fa9e593410746ef8
-
openssl-static-1.1.1k-12.el8.tuxcare.els2.x86_64.rpm
sha:27cb825d0dba51fe626aee7348119a4afe30d6932010679f6a48f19f2d2ac292
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.