Este contenido no está disponible en el idioma seleccionado.

4.133. libgcrypt


An updated libgcrypt package that add an enhancement is now available for Red Hat Enterprise Linux 6.
The libgcrypt package contains a library which provides general-purpose implementations of various cryptographic algorithms.

Enhancement

BZ#727283
With this update, the libgcrypt library has been recompiled with read-only relocation support that improves the security vulnerability properties of applications that use the library.
All users of libgcrypt are advised to upgrade to this updated package, which adds this enhancement.
Updated libgcrypt packages that add one enhancement are now available for Red Hat Enterprise Linux 6.
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.

Enhancement

BZ#810320
With Federal Information Processing Standards (FIPS) mode enabled, the libgcrypt library always started in the soft FIPS mode which allows applications to use the MD5 cryptographic hash algorithm. The libgcrypt API previously did not allow the library to programmatically switch from the soft FIPS mode to the enforced FIPS mode. With this update, if the application does not need MD5 support for the Transport Layer Security (TLS) protocol or non-cryptographic purposes, libgcrypt can be preset in the enforced FIPS mode.
All users of libgcrypt are advised to upgrade to these updated packages, which add this enhancement.
Red Hat logoGithubRedditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

© 2024 Red Hat, Inc.