On Tuesday, 8 November 2022 08:51:32 CET, Matthias Apitz wrote:
El día martes, noviembre 08, 2022 a las 08:26:54a. m. +0100,
Tomas Mraz escribió:
Hi,
Red Hat patches its OpenSSL implementation with some additional API
calls. That means you cannot use builds from an unpatched upstream
OpenSSL
Red Hat backports security fixes to older versions so if you keep your
RHEL installation up-to-date with 'yum update' you should not need to
install newer upstream releases on the system.
Regards,
Tomas Mraz
On Tue, 2022-11-08 at 08:51 +0100, Matthias Apitz wrote:
> El día martes, noviembre 08,
El día martes, noviembre 08, 2022 a las 08:26:54a. m. +0100, Tomas Mraz
escribió:
> Hi,
>
> Red Hat patches its OpenSSL implementation with some additional API
> calls. That means you cannot use builds from an unpatched upstream
> OpenSSL tarball in place of the system libcrypto and libssl libra
Hi,
Red Hat patches its OpenSSL implementation with some additional API
calls. That means you cannot use builds from an unpatched upstream
OpenSSL tarball in place of the system libcrypto and libssl libraries.
The proper way is to always obtain updated system packages from your
vendor, i.e., Red
Hello,
We compile openssl 1.1.1l from the sources and run on RedHat 8.6 into the
problem that the system shared lib /usr/lib64/libk5crypto.so.3 misses a
symbol from openssl:
# objdump -TC /usr/lib64/libk5crypto.so.3 | grep EVP_KDF
DF *UND* OPENSSL_1_1_1b