| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: libtpms0 | Distribution: openSUSE Tumbleweed |
| Version: 0.10.1 | Vendor: openSUSE |
| Release: 2.1 | Build date: Fri Aug 22 11:17:44 2025 |
| Group: Development/Libraries/C and C++ | Build host: reproducible |
| Size: 1150091 | Source RPM: libtpms-0.10.1-2.1.src.rpm |
| Packager: http://bugs.opensuse.org | |
| Url: https://github.com/stefanberger/libtpms | |
| Summary: Library providing Trusted Platform Module (TPM) functionality | |
A library providing TPM functionality for VMs. Targeted for integration into Qemu.
BSD-3-Clause
* Fri Aug 22 2025 Giacomo Leidi <giacomo.leidi@suse.com>
- Allow for %is_opensuse to be unset, following up to
https://src.suse.de/products/SLFO/pulls/204 (bsc#1248486).
* Mon Jun 16 2025 Dominique Leuenberger <dimstar@opensuse.org>
- Update to version 0.10.1:
* tpm2: Fix potential out-of-bound access & abort due to HMAC
signing issue (CVE-2025-49133).
* tpm2: fix build for LibreSSL 4.1.0.
* tpm2: In CheckLockedOut replace TPM_RC_RETRY with
TPM_RC_SUCCESS.
* tpm2: Fix bugs in RuntimeProfileDedupStrItems.
* tpm2 + test: Make it compilable on Debian GNU Hurd.
* tpm2: Add asserts to silence compiler warning due to
- Wstringop-overflow=.
* tpm2: Add padding to OBJECT for 32bit targets.
- Drop tpm2-Add-padding-to-OBJECT-for-32bit-targets.patch: fixed
upstream.
* Fri Dec 06 2024 Manfred Hollstein <manfred.h@gmx.net>
- Use gcc/g++-13 on Leap to fix the following failure:
"tpm2_setprofile.c:49:24: error: initializer element is not constant"
* Wed Dec 04 2024 Alberto Planas Dominguez <aplanas@suse.com>
- Add tpm2-Add-padding-to-OBJECT-for-32bit-targets.patch
- Update to 0.10.0:
* tpm2: Support for profiles: default-v1 & custom
* tpm2: Add new API call TPMLIB_SetProfile to enable user to set a
profile
* tpm2: Extende TPMLIB_GetInfo to return profiles-related info
* tpm2: Implemented crypto tests and restrictions on crypto related
to FIPS-140-3; can be enabled with profiles
* tpm2: Enable Camellia-192 and AES-192
* tpm2: Implement TPMLIB_WasManufactured API call
* tpm2: Fixes for issues detected by static analyzers
* tpm2: Use OpenSSL-based KDFe implementation if possible
* tpm2: Update to TPM 2 spec rev 183 (many changes)
* tpm2: Better support for OpenSSL 3.x
* tpm2: Use Carmichael function for RSA priv. exponent D (>= 2048
bits)
* tpm2: Fixes for CVE-2023-1017 and CVE-2023-1018
* tpm2: Fix of SignedCompareB().
- NOTE: This fix may result in backwards compatibility issues with PCR
policies used by TPM2_PolicyCounterTimer and TPM2_PolicyNV when
upgrading from v0.9 to v0.10.
* Mon Mar 06 2023 Alberto Planas Dominguez <aplanas@suse.com>
- Update to 0.9.6:
* CVE-2023-1018: tpm2: Fixed out of bounds read in CryptParameterDecryption (bsc#1206023)
* CVE-2023-1017: tpm2: Fixed out of bounds write in CryptParameterDecryption (bsc#1206022)
- 0001-tpm2-Check-size-of-buffer-before-accessing-it-CVE-20.patch: upstreamed
* Sat Dec 03 2022 Dirk Müller <dmueller@suse.com>
- update to 0.9.5:
* tpm2: Do not set RSA_FLAG_NO_BLINDING on RSA keys anymore
* tpm2: Fix a potential overflow expression (coverity)
* tpm2: Fix size check in CryptSecretDecrypt
* tpm: #undef printf in case it is #define'd (OSS-Fuzz)
* tpm2: Check return code of BN_div()
* tpm2: Initialize variables due to gcc complaint (s390x, false positive)
* tpm12: Initialize variables due to gcc complaint (s390x, false positive)
* build-sys: Fix configure script to support _FORTIFY_SOURCE=3
* Fri Nov 25 2022 pgajdos@suse.com
- fix build for ppc64le: use -Wl,--no-as-needed in check-local
[bsc#1204556]
* Sun Apr 10 2022 Dirk Müller <dmueller@suse.com>
- update to 0.9.3:
* build-sys: Add probing for -fstack-protector
* tpm2: Do not call EVP_PKEY_CTX_set0_rsa_oaep_label() for label of size
* (OSSL 3)
* tpm2: When writing state initialize s_ContextSlotMask if not set
* Thu Dec 09 2021 Ferdinand Thiessen <rpm@fthiessen.de>
- Update to version 0.9.1
* Downgrade to previous versions is not possible, as the size of
the context gap has been adjusted to 0xffff from 0xff.
* Enabled Camellia symmetric key encryption algorithm
* tpm2: Update to TPM 2 spec rev 164
* tpm2: Added a cache for private exponent D and prime Q
* tpm2: bug fixes
- Drop upstream fixed libtpms-CVE-2021-3746.patch
- Fixed CVE-2021-3623 (bsc#1187767)
- Used in SLE:
0001-tpm2-Reset-TPM2B-buffer-sizes-after-test-fails-for-v.patch
0002-tpm2-Add-maxSize-parameter-to-TPM2B_Marshal-for-sani.patch
0003-tpm2-Restore-original-value-if-unmarsalled-value-was.patch
* Tue Aug 31 2021 pgajdos@suse.com
- security update
- added patches
fix CVE-2021-3746 [bsc#1189935], out-of-bounds access via specially crafted TPM 2 command packets
+ libtpms-CVE-2021-3746.patch
/usr/lib/libtpms.so.0 /usr/lib/libtpms.so.0.10.1 /usr/share/doc/packages/libtpms0 /usr/share/doc/packages/libtpms0/CHANGES /usr/share/doc/packages/libtpms0/README /usr/share/licenses/libtpms0 /usr/share/licenses/libtpms0/LICENSE
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Oct 23 22:29:00 2025