Bug 1312859 - [RFE] Backport FIPS mode workaround for hashlib from RHEL-6
Summary: [RFE] Backport FIPS mode workaround for hashlib from RHEL-6
Keywords:
Status: CLOSED EOL
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: python26
Version: el5
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Adrien Devresse
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-02-29 12:06 UTC by Hubert Kario
Modified: 2017-04-06 10:03 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-04-06 10:03:41 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Hubert Kario 2016-02-29 12:06:24 UTC
Description of problem:
When hashlib is used for calculating MD5 digest and the system is running in FIPS mode, the OpenSSL implementation will abort process

Version-Release number of selected component (if applicable):
python26-2.6.8-2.el5.x86_64

How reproducible:
always

Steps to Reproduce:
1. Enable FIPS mode in RHEL-5
2. use hashlib module to calculate MD5 hash
3.

Actual results:
digest.c(151): OpenSSL internal error, assertion failed: Digest update previous FIPS forbidden algorithm error ignored

Expected results:
ValueError raised, usedforsecurity parameter to new() supported

Additional info:
The feature is implemented in python-2.6.5-hashlib-fips.patch in RHEL-6 package

Comment 1 Fedora End Of Life 2017-04-06 10:03:41 UTC
Fedora EPEL 5 changed to end-of-life (EOL) status on 2017-03-31. Fedora EPEL 5
is no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of Fedora
or Fedora EPEL, please feel free to reopen this bug against that version. If
you are unable to reopen this bug, please file a new report against the current
release. If you experience problems, please add a comment to this bug.

Thank you for reporting this bug and we are sorry it could not be fixed.


Note You need to log in before you can comment on or make changes to this bug.