Bug 2026636
| Summary: | Rebase to latest version 1.10.x when available | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Jakub Jelen <jjelen> |
| Component: | libgcrypt | Assignee: | Jakub Jelen <jjelen> |
| Status: | CLOSED ERRATA | QA Contact: | Stanislav Zidek <szidek> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | high | ||
| Version: | 9.0 | CC: | pkis |
| Target Milestone: | rc | Keywords: | Rebase, Triaged |
| Target Release: | 9.0 | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | libgcrypt-1.10.0-1.el9 | Doc Type: | Rebase: Bug Fixes and Enhancements |
| Doc Text: |
Rebase package(s) to version: 1.10.0
Highlights, important fixes, or notable enhancements:
* Support for FIPS 140-3
* New FIPS Service Indicators API for symmetric ciphers and KDFs
* Disable DSA and DES in FIPS mode
* New API to leave FIPS mode
* update jitter entropy generator to 3.3.0
* Store the HMAC integrity checksums inside of the library ELF section .rodata
* enforce required RSA and HMAC key sizes
* new API for digest and signature/verification, enforcing the digest requirement (not allowing SHA-1)
* run the HMAC SHA256 selftest before checking the library integrity
* allow using RSA keys > 3k
* remove CAVS tests scripts
* remove the support for the forced FIPS mode using API or configuration file
* remove a way to automatically inactivate FIPS mode when non-approved algorithm is used.
* Support LIBGCRYPT_FORCE_FIPS_MODE to get library into FIPS mode
* enable hardware optimizations
* Simplify random gatherer to use getentropy()
* Improve test coverage
* hardware optimizations and hardening for various ciphers and modes on different architectures
* AES-GCM optimization on ppc64le
* GCM-SIV mode on ARMv8-CE, x86
* s390x accelerated scalar multiplication for ECC
* Support for key wrapping with padding
* Remove support for random daemon
* support for GCM-SIV and SIV cipher modes
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-05-17 15:52:38 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Jakub Jelen
2021-11-25 11:19:54 UTC
The upstream release issue has date set to 17. 1. 2022 so we can expect getting the release into RHEL9 by the end of January [1] https://dev.gnupg.org/T5691 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (new packages: libgcrypt), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:3941 |