Release date:
2025-07-07 11:54:47 UTC
Description:
- CVE-2024-13176: fix timing side-channel in ECDSA signature computation
Updated packages:
-
openssl-1.1.1k-5.el8.5.tuxcare.els13.x86_64.rpm
sha:31ca9182adb508f5be4258c7712d43ff16c1b2bc86dfe157d8acefa3e8a58952
-
openssl-devel-1.1.1k-5.el8.5.tuxcare.els13.i686.rpm
sha:2c402eee83f5c4c6115ee6ec194c6a8edebd40701b07d30da469ad3f7e88d919
-
openssl-devel-1.1.1k-5.el8.5.tuxcare.els13.x86_64.rpm
sha:479dddee6752cabf44bff38870d984185718121abccc84b50fe42574736967a7
-
openssl-libs-1.1.1k-5.el8.5.tuxcare.els13.i686.rpm
sha:216613bb55ac1ced5fa951a09ad17c105bd28779de141a0acd514eee8f5321eb
-
openssl-libs-1.1.1k-5.el8.5.tuxcare.els13.x86_64.rpm
sha:f48043cb59adff54ff3ce8cb2d638e8bc8fa0ac24136d12fb84a7c3b10a463f4
-
openssl-perl-1.1.1k-5.el8.5.tuxcare.els13.x86_64.rpm
sha:59d59839a6e66f75a97475754b4c45ef991237c17600be16b001f5e38dd1ba96
-
openssl-static-1.1.1k-5.el8.5.tuxcare.els13.x86_64.rpm
sha:d343605bffe2a417dc2b77e3e8a3e178d8fe23c108cbeadd2e46f3a881917d0d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.