Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libtpms0-0.10.0-2.1 RPM for armv6hl

From OpenSuSE Ports Tumbleweed for armv6hl

Name: libtpms0 Distribution: openSUSE Tumbleweed
Version: 0.10.0 Vendor: openSUSE
Release: 2.1 Build date: Fri Dec 6 10:03:46 2024
Group: Development/Libraries/C and C++ Build host: reproducible
Size: 936742 Source RPM: libtpms-0.10.0-2.1.src.rpm
Packager: http://bugs.opensuse.org
Url: https://github.com/stefanberger/libtpms
Summary: Library providing Trusted Platform Module (TPM) functionality
A library providing TPM functionality for VMs. Targeted for integration
into Qemu.

Provides

Requires

License

BSD-3-Clause

Changelog

* Fri Dec 06 2024 Manfred Hollstein <[email protected]>
  - Use gcc/g++-13 on Leap to fix the following failure:
    "tpm2_setprofile.c:49:24: error: initializer element is not constant"
* Wed Dec 04 2024 Alberto Planas Dominguez <[email protected]>
  - Add tpm2-Add-padding-to-OBJECT-for-32bit-targets.patch
  - Update to 0.10.0:
    * tpm2: Support for profiles: default-v1 & custom
    * tpm2: Add new API call TPMLIB_SetProfile to enable user to set a
      profile
    * tpm2: Extende TPMLIB_GetInfo to return profiles-related info
    * tpm2: Implemented crypto tests and restrictions on crypto related
      to FIPS-140-3; can be enabled with profiles
    * tpm2: Enable Camellia-192 and AES-192
    * tpm2: Implement TPMLIB_WasManufactured API call
    * tpm2: Fixes for issues detected by static analyzers
    * tpm2: Use OpenSSL-based KDFe implementation if possible
    * tpm2: Update to TPM 2 spec rev 183 (many changes)
    * tpm2: Better support for OpenSSL 3.x
    * tpm2: Use Carmichael function for RSA priv. exponent D (>= 2048
      bits)
    * tpm2: Fixes for CVE-2023-1017 and CVE-2023-1018
    * tpm2: Fix of SignedCompareB().
  - NOTE: This fix may result in backwards compatibility issues with PCR
    policies used by TPM2_PolicyCounterTimer and TPM2_PolicyNV when
    upgrading from v0.9 to v0.10.
* Mon Mar 06 2023 Alberto Planas Dominguez <[email protected]>
  - Update to 0.9.6:
    * CVE-2023-1018: tpm2: Fixed out of bounds read in CryptParameterDecryption (bsc#1206023)
    * CVE-2023-1017: tpm2: Fixed out of bounds write in CryptParameterDecryption (bsc#1206022)
  - 0001-tpm2-Check-size-of-buffer-before-accessing-it-CVE-20.patch: upstreamed
* Sat Dec 03 2022 Dirk Müller <[email protected]>
  - update to 0.9.5:
    * tpm2: Do not set RSA_FLAG_NO_BLINDING on RSA keys anymore
    * tpm2: Fix a potential overflow expression (coverity)
    * tpm2: Fix size check in CryptSecretDecrypt
    * tpm: #undef printf in case it is #define'd (OSS-Fuzz)
    * tpm2: Check return code of BN_div()
    * tpm2: Initialize variables due to gcc complaint (s390x, false positive)
    * tpm12: Initialize variables due to gcc complaint (s390x, false positive)
    * build-sys: Fix configure script to support _FORTIFY_SOURCE=3
* Fri Nov 25 2022 [email protected]
  - fix build for ppc64le: use -Wl,--no-as-needed in check-local
    [bsc#1204556]
* Sun Apr 10 2022 Dirk Müller <[email protected]>
  - update to 0.9.3:
    * build-sys: Add probing for -fstack-protector
    * tpm2: Do not call EVP_PKEY_CTX_set0_rsa_oaep_label() for label of size
    * (OSSL 3)
    * tpm2: When writing state initialize s_ContextSlotMask if not set
* Thu Dec 09 2021 Ferdinand Thiessen <[email protected]>
  - Update to version 0.9.1
    * Downgrade to previous versions is not possible, as the size of
      the context gap has been adjusted to 0xffff from 0xff.
    * Enabled Camellia symmetric key encryption algorithm
    * tpm2: Update to TPM 2 spec rev 164
    * tpm2: Added a cache for private exponent D and prime Q
    * tpm2: bug fixes
  - Drop upstream fixed libtpms-CVE-2021-3746.patch
  - Fixed CVE-2021-3623 (bsc#1187767)
  - Used in SLE:
    0001-tpm2-Reset-TPM2B-buffer-sizes-after-test-fails-for-v.patch
    0002-tpm2-Add-maxSize-parameter-to-TPM2B_Marshal-for-sani.patch
    0003-tpm2-Restore-original-value-if-unmarsalled-value-was.patch
* Tue Aug 31 2021 [email protected]
  - security update
  - added patches
    fix CVE-2021-3746 [bsc#1189935], out-of-bounds access via specially crafted TPM 2 command packets
    + libtpms-CVE-2021-3746.patch
* Sat Aug 07 2021 Callum Farmer <[email protected]>
  - Update to version 0.8.4:
    * Reset too large size indicators in TPM2B to avoid access
      beyond buffer
    * Restore original value in buffer if unmarshalled one was
      illegal
* Mon Apr 19 2021 Gary Ching-Pang Lin <[email protected]>
  - Update to version 0.8.2
    * NOTE: Downgrade to 0.7.x or below is not possible.
      Due to fixes in the TPM 2 prime number generation code in
      rev155 it is not possible to downgrade from libtpms version
      0.8.0 to some previous version. The seeds are now associated
      with an age so that older seeds use the old TPM 2 prime number
      generation code while newer seed use the newer code.
    * tpm2: rev155: Add new RsaAdjustPrimeCandidate code but do
      not use (bsc#1184939 CVE-2021-3505)
    * tpm2: Activate SEED_COMPAT_LEVEL_RSA_PRIME_ADJUST_FIX
      (bsc#1184939 CVE-2021-3505)
    * Update to TPM 2 code release 159
    - X509 support is enabled
      + SM2 signing of ceritificates is NOT supported
    - Authenticated timers are disabled
    * Update to TPM 2 code relase 162
    - ECC encryption / decryption is disabled
    * Fix support for elliptic curve due to missing unmarshalling
      code
    * Runtime filter supported elliptic curves supported by OpenSSL
    * Fix output buffer parameter and size for RSA decryption that
      could cause stack corruption under certain circumstances
    * Set the RSA PSS salt length to the digest length rather than
      max
    * Fixes to symmetric decryption related to input size check,
      defer padding to the user [EVP_CIPHER_CTX_set_padding(ctx, 0)]
      and to always use a temporary malloc'ed buffer for decryption
    * Fixed the set of PCRs belonging to the TCB group. This affects
      the pcrUpdateCounter in TPM2_Pcrread() responses, thus needs
      latest swtpm for test cases to succeed there.
* Fri Mar 19 2021 Gary Ching-Pang Lin <[email protected]>
  - Update to version 0.7.7
    * CryptSym: fix AES output IV (bsc#1183729, CVE-2021-3446)
    * tpm2: Fix public key context save due to ANY_OBJECT_Marshal usage
    * tpm2: Address some Coverity issues (false positives)
    * tpm1.2: Backported ASAN/UBSAN related fixes
    * tpm2: Return properly sized array for b parameter for NIST P521
      (HLK)
    * tpm2: Addressed issues detected by UBSAN
    * tpm2: Addressed issues detected by cppcheck (false positives)

Files

/usr/lib/libtpms.so.0
/usr/lib/libtpms.so.0.10.0
/usr/share/doc/packages/libtpms0
/usr/share/doc/packages/libtpms0/CHANGES
/usr/share/doc/packages/libtpms0/README
/usr/share/licenses/libtpms0
/usr/share/licenses/libtpms0/LICENSE


Generated by rpm2html 1.8.1

Fabrice Bellet, Thu Dec 12 00:31:04 2024