SUSE-RU-2022:3551-1: moderate: Recommended update for libgcrypt

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Oct 7 19:18:57 UTC 2022


   SUSE Recommended Update: Recommended update for libgcrypt
______________________________________________________________________________

Announcement ID:    SUSE-RU-2022:3551-1
Rating:             moderate
References:         #1182983 #1190700 #1191020 #1202117 SLE-24941 
                    
Affected Products:
                    SUSE Linux Enterprise Desktop 15-SP4
                    SUSE Linux Enterprise High Performance Computing 15-SP4
                    SUSE Linux Enterprise Module for Basesystem 15-SP4
                    SUSE Linux Enterprise Server 15-SP4
                    SUSE Linux Enterprise Server for SAP Applications 15-SP4
                    SUSE Manager Proxy 4.3
                    SUSE Manager Retail Branch Server 4.3
                    SUSE Manager Server 4.3
                    openSUSE Leap 15.4
______________________________________________________________________________

   An update that has four recommended fixes and contains one
   feature can now be installed.

Description:

   This update for libgcrypt fixes the following issues:

   - FIPS: Fixed gpg/gpg2 gets out of core handler in FIPS mode while typing
     Tab key to Auto-Completion. [bsc#1182983]

   - FIPS: Ported libgcrypt to use jitterentropy [bsc#1202117, jsc#SLE-24941]

     * Enable the jitter based entropy generator by default in random.conf
     * Update the internal jitterentropy to version 3.4.0

   - FIPS: Get most of the entropy from rndjent_poll [bsc#1202117]
   - FIPS: Check keylength in gcry_fips_indicator_kdf() [bsc#1190700]

     * Consider approved keylength greater or equal to 112 bits.

   - FIPS: Zeroize buffer and digest in check_binary_integrity() [bsc#1191020]


Patch Instructions:

   To install this SUSE Recommended Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.4:

      zypper in -t patch openSUSE-SLE-15.4-2022-3551=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3551=1



Package List:

   - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):

      libgcrypt-cavs-1.9.4-150400.6.5.1
      libgcrypt-cavs-debuginfo-1.9.4-150400.6.5.1
      libgcrypt-debugsource-1.9.4-150400.6.5.1
      libgcrypt-devel-1.9.4-150400.6.5.1
      libgcrypt-devel-debuginfo-1.9.4-150400.6.5.1
      libgcrypt20-1.9.4-150400.6.5.1
      libgcrypt20-debuginfo-1.9.4-150400.6.5.1
      libgcrypt20-hmac-1.9.4-150400.6.5.1

   - openSUSE Leap 15.4 (x86_64):

      libgcrypt-devel-32bit-1.9.4-150400.6.5.1
      libgcrypt-devel-32bit-debuginfo-1.9.4-150400.6.5.1
      libgcrypt20-32bit-1.9.4-150400.6.5.1
      libgcrypt20-32bit-debuginfo-1.9.4-150400.6.5.1
      libgcrypt20-hmac-32bit-1.9.4-150400.6.5.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):

      libgcrypt-debugsource-1.9.4-150400.6.5.1
      libgcrypt-devel-1.9.4-150400.6.5.1
      libgcrypt-devel-debuginfo-1.9.4-150400.6.5.1
      libgcrypt20-1.9.4-150400.6.5.1
      libgcrypt20-debuginfo-1.9.4-150400.6.5.1
      libgcrypt20-hmac-1.9.4-150400.6.5.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):

      libgcrypt20-32bit-1.9.4-150400.6.5.1
      libgcrypt20-32bit-debuginfo-1.9.4-150400.6.5.1
      libgcrypt20-hmac-32bit-1.9.4-150400.6.5.1


References:

   https://bugzilla.suse.com/1182983
   https://bugzilla.suse.com/1190700
   https://bugzilla.suse.com/1191020
   https://bugzilla.suse.com/1202117



More information about the sle-updates mailing list