Updated libgcrypt packages that fix two bugs are now available for Red HatEnterprise Linux 7.

The libgcrypt library provides general-purpose implementations of variouscryptographic algorithms.This update fixes the following bugs:* Previously, when the dracut-fips package was installed, the libgcrypt libraryaccessed the /dev/random device unnecessarily. This caused SELinux to produceaudit events for confined applications that link to the libgcrypt library, andthe random number generator did not initialize properly. With this update,libgcrypt no longer accesses /dev/random during the startup self-test, and if/dev/random is not accessible, libgcrypt uses /dev/urandom instead. As a result,SELinux no longer inappropriately creates libgcrypt-linked audit events, and therandom number generator is initialized properly. (BZ#1210636)* Prior to this update, the libgcrypt RSA public key encryption self-test thatis run when the dracut-fips package is installed in some cases failed andreported an error. The RSA key values used in the self-test have been corrected,and the self-test no longer fails. (BZ#1210634)Users of libgcrypt are advised to upgrade to these updated packages, which fixthese bugs.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
libgcrypt-1.5.3-12.el7_1.1.src.rpm
    MD5: d551cc90dcbdf8f56155aa52771f38c7SHA-256: f89edc6119db13b9dcdcbca6b7e166797a864068abb5fab94feead044a49397f
 
x86_64:
libgcrypt-1.5.3-12.el7_1.1.i686.rpm
    MD5: ef0dade8b169e42980e8fcc0c6569479SHA-256: bc12bce209e775e85581365340d08870882060af206c67ec9efe1339226fe90c
libgcrypt-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: a99b4bb2f8f06bdb9d578210197a4e29SHA-256: 85cd7085b40105906c1fb8cd9aa98bbdccfad6ad036148c0e1223ac9abefd4c1
libgcrypt-debuginfo-1.5.3-12.el7_1.1.i686.rpm
    MD5: 0058ecb9d39b3a8ad0474eb6e4e27facSHA-256: b912705d9fe267b496a7a23cf16a62c46f8c76db9a845ec4a7934a7ce75a2ea5
libgcrypt-debuginfo-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: 01788cddac3ebaa45bcc9bb9f839f41cSHA-256: a74c68f1c800b81e97a7c45dafc511a7482031c14898d149c2139c8a1fad99f9
libgcrypt-devel-1.5.3-12.el7_1.1.i686.rpm
    MD5: a49afd6da41039f80e98854fcedb68b9SHA-256: b49f5ac8568ce7c438b33875b56ced652a4013cc7b08ea8086930af3ee405dfc
libgcrypt-devel-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: e762046feb852ee982d517504d704778SHA-256: e2d3404a45877989f3beb001216f69b3dc793956866894937800a062a0b76f14
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
libgcrypt-1.5.3-12.el7_1.1.src.rpm
    MD5: d551cc90dcbdf8f56155aa52771f38c7SHA-256: f89edc6119db13b9dcdcbca6b7e166797a864068abb5fab94feead044a49397f
 
x86_64:
libgcrypt-1.5.3-12.el7_1.1.i686.rpm
    MD5: ef0dade8b169e42980e8fcc0c6569479SHA-256: bc12bce209e775e85581365340d08870882060af206c67ec9efe1339226fe90c
libgcrypt-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: a99b4bb2f8f06bdb9d578210197a4e29SHA-256: 85cd7085b40105906c1fb8cd9aa98bbdccfad6ad036148c0e1223ac9abefd4c1
libgcrypt-debuginfo-1.5.3-12.el7_1.1.i686.rpm
    MD5: 0058ecb9d39b3a8ad0474eb6e4e27facSHA-256: b912705d9fe267b496a7a23cf16a62c46f8c76db9a845ec4a7934a7ce75a2ea5
libgcrypt-debuginfo-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: 01788cddac3ebaa45bcc9bb9f839f41cSHA-256: a74c68f1c800b81e97a7c45dafc511a7482031c14898d149c2139c8a1fad99f9
libgcrypt-devel-1.5.3-12.el7_1.1.i686.rpm
    MD5: a49afd6da41039f80e98854fcedb68b9SHA-256: b49f5ac8568ce7c438b33875b56ced652a4013cc7b08ea8086930af3ee405dfc
libgcrypt-devel-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: e762046feb852ee982d517504d704778SHA-256: e2d3404a45877989f3beb001216f69b3dc793956866894937800a062a0b76f14
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
libgcrypt-1.5.3-12.el7_1.1.src.rpm
    MD5: d551cc90dcbdf8f56155aa52771f38c7SHA-256: f89edc6119db13b9dcdcbca6b7e166797a864068abb5fab94feead044a49397f
 
PPC:
libgcrypt-1.5.3-12.el7_1.1.ppc.rpm
    MD5: 85596926a39aa023e305f391a75c10ecSHA-256: 2f5f7a4b277f78798c1f8f32039b4c3143e184203dffba5d35ea50143b155ea1
libgcrypt-1.5.3-12.el7_1.1.ppc64.rpm
    MD5: 90f714cf722145f97d65ea87f1c96016SHA-256: 78786da66365429e88fecae684afb058c8225cc0d6b7ac41adbf848525565cd3
libgcrypt-debuginfo-1.5.3-12.el7_1.1.ppc.rpm
    MD5: 3ffd7185db115e0bb6c874055325b95fSHA-256: 69f946dcecb368a626e74e1d5d22ef87de0cfdbedf242ab65595112de6cf2131
libgcrypt-debuginfo-1.5.3-12.el7_1.1.ppc64.rpm
    MD5: d6d4e4ad989ed5825f3d43ff1866b92cSHA-256: 3a179b9cc6fa6968a00f3750c0e892d8e58c09df1cbd2da366730f740f471fda
libgcrypt-devel-1.5.3-12.el7_1.1.ppc.rpm
    MD5: c74144c467f29f26f195cc5922efe499SHA-256: e14fea2bed94775c21950f58c1f89e8566003d8fd150213f5958d62bdb02c48e
libgcrypt-devel-1.5.3-12.el7_1.1.ppc64.rpm
    MD5: 42e5985e02364a8eede98cc3be8415b2SHA-256: 9f7e79fa7c91daedf48a27e47ac51dcacc373a1a3537eff732ccbf3ad4ffa1d5
 
s390x:
libgcrypt-1.5.3-12.el7_1.1.s390.rpm
    MD5: 50fff00fd7fe98f3721eec470f8a1497SHA-256: 0c3c09a6312056fe9d3f4adbbd163b30bde219297599be31b6f5438a5ae5e197
libgcrypt-1.5.3-12.el7_1.1.s390x.rpm
    MD5: ff95d219fbb321893f87c81591ce4e31SHA-256: cf74fe0da9d30e7441394ef93a018714631f9f1ef3839bf8c9e8343ea320d21f
libgcrypt-debuginfo-1.5.3-12.el7_1.1.s390.rpm
    MD5: a7c9effc7cc306393c1b13bef65b0e7fSHA-256: 385474ac74723feb65df8845215d91d3ae94cf5f2cf24caa8645e1bce584c28e
libgcrypt-debuginfo-1.5.3-12.el7_1.1.s390x.rpm
    MD5: 92695103d08266130c2f9dfd69c7c59eSHA-256: 9bda2b5760c83bb866141b9133c27759d89fea446701beee0e7421fde7eb3c80
libgcrypt-devel-1.5.3-12.el7_1.1.s390.rpm
    MD5: 83b235a01f1f6582e5b4d9ccc686058eSHA-256: 503c0350775fe5b5aa07b867f1c5c3f351b0957b2a9b6cd3385c8883f507e572
libgcrypt-devel-1.5.3-12.el7_1.1.s390x.rpm
    MD5: 37b744b9dff0162a0b3779832359a7e9SHA-256: def948416b355a7f3f24879fbfc0766b7a842a6fc1ddb6f835f340f3f59ef64a
 
x86_64:
libgcrypt-1.5.3-12.el7_1.1.i686.rpm
    MD5: ef0dade8b169e42980e8fcc0c6569479SHA-256: bc12bce209e775e85581365340d08870882060af206c67ec9efe1339226fe90c
libgcrypt-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: a99b4bb2f8f06bdb9d578210197a4e29SHA-256: 85cd7085b40105906c1fb8cd9aa98bbdccfad6ad036148c0e1223ac9abefd4c1
libgcrypt-debuginfo-1.5.3-12.el7_1.1.i686.rpm
    MD5: 0058ecb9d39b3a8ad0474eb6e4e27facSHA-256: b912705d9fe267b496a7a23cf16a62c46f8c76db9a845ec4a7934a7ce75a2ea5
libgcrypt-debuginfo-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: 01788cddac3ebaa45bcc9bb9f839f41cSHA-256: a74c68f1c800b81e97a7c45dafc511a7482031c14898d149c2139c8a1fad99f9
libgcrypt-devel-1.5.3-12.el7_1.1.i686.rpm
    MD5: a49afd6da41039f80e98854fcedb68b9SHA-256: b49f5ac8568ce7c438b33875b56ced652a4013cc7b08ea8086930af3ee405dfc
libgcrypt-devel-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: e762046feb852ee982d517504d704778SHA-256: e2d3404a45877989f3beb001216f69b3dc793956866894937800a062a0b76f14
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
libgcrypt-1.5.3-12.el7_1.1.src.rpm
    MD5: d551cc90dcbdf8f56155aa52771f38c7SHA-256: f89edc6119db13b9dcdcbca6b7e166797a864068abb5fab94feead044a49397f
 
x86_64:
libgcrypt-1.5.3-12.el7_1.1.i686.rpm
    MD5: ef0dade8b169e42980e8fcc0c6569479SHA-256: bc12bce209e775e85581365340d08870882060af206c67ec9efe1339226fe90c
libgcrypt-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: a99b4bb2f8f06bdb9d578210197a4e29SHA-256: 85cd7085b40105906c1fb8cd9aa98bbdccfad6ad036148c0e1223ac9abefd4c1
libgcrypt-debuginfo-1.5.3-12.el7_1.1.i686.rpm
    MD5: 0058ecb9d39b3a8ad0474eb6e4e27facSHA-256: b912705d9fe267b496a7a23cf16a62c46f8c76db9a845ec4a7934a7ce75a2ea5
libgcrypt-debuginfo-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: 01788cddac3ebaa45bcc9bb9f839f41cSHA-256: a74c68f1c800b81e97a7c45dafc511a7482031c14898d149c2139c8a1fad99f9
libgcrypt-devel-1.5.3-12.el7_1.1.i686.rpm
    MD5: a49afd6da41039f80e98854fcedb68b9SHA-256: b49f5ac8568ce7c438b33875b56ced652a4013cc7b08ea8086930af3ee405dfc
libgcrypt-devel-1.5.3-12.el7_1.1.x86_64.rpm
    MD5: e762046feb852ee982d517504d704778SHA-256: e2d3404a45877989f3beb001216f69b3dc793956866894937800a062a0b76f14
 
(The unlinked packages above are only available from the Red Hat Network)
1210634 – The FIPS RSA key components are switched1210636 – Do not access /dev/random in the selftest and use /dev/urandom instead of /dev/random if unavailable

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply