-
Bug
-
Resolution: Unresolved
-
Major
-
rhel-10.1
-
crypto-policies-20250905-1.gitc7eb7b2.el10_1
-
No
-
Moderate
-
ZStream
-
1
-
rhel-security-crypto-spades
-
31
-
2
-
False
-
False
-
-
No
-
Crypto25September
-
Approved Blocker
-
-
Pass
-
Enabled
-
Automated
-
Unspecified Release Note Type - Unknown
-
Unspecified
-
Unspecified
-
Unspecified
-
None
In FIPS mode, RPM is not able to import MLDSA-87 public key, therefore verification of RPMs will start failing once we ship dual-signed packages.
The relevant fix in rpm-sequoia will be in RHEL-110994, but without enabling these algorithms in crypto policies, it will not work.
I think the scope should be basically revert of the following MR we did couple of months back:
https://gitlab.com/redhat-crypto/fedora-crypto-policies/-/merge_requests/253
(we can consider enabling only the `MLDSA87-ED448` though, as it is the one required for CNSA 2.0.
- clones
-
RHEL-110994 rpm --import mldsa87.pub fails in FIPS
-
- Release Pending
-
- links to
-
RHBA-2025:148296 crypto-policies bug fix and enhancement update