Go to file
Alberto Planas Dominguez 892426b7ff Accepting request 987866 from home:aplanas:branches:security
- Version 2.4.1
  + Added
    Contributor Covenant Code of Conduct.
  + Fixed
    * superflous warning messages about tcti status.
        WARNING **: 11:00:56.205: tcti_conf before: "(null)"
        WARNING **: 11:00:56.205: tcti_conf after: "mssim"
    * GCC 11 build error: error: argument 2 of __atomic_load’ discards
      'volatile' qualifier
    * Initialize gerror pointer variable to NULL to fix use of
      unitialized memory and segfault.
    * Updated missing defaults in manpage.
    * Port CI to composite actions in tpm2-software/ci.
  + Removed
    Dependency on 'which' utility in configure.ac.
    ubuntu-16.04 from CI.

OBS-URL: https://build.opensuse.org/request/show/987866
OBS-URL: https://build.opensuse.org/package/show/security/tpm2.0-abrmd?expand=0&rev=68
2022-07-08 09:24:21 +00:00
.gitattributes Accepting request 514156 from home:mgerstner:branches:security 2017-08-03 08:13:01 +00:00
.gitignore Accepting request 514156 from home:mgerstner:branches:security 2017-08-03 08:13:01 +00:00
dbus-access.patch - restrict D-Bus access to tpm2-abrmd to members of the tss group 2022-04-04 10:57:16 +00:00
harden_tpm2-abrmd.service.patch Accepting request 933795 from home:jsegitz:branches:systemdhardening:security 2021-11-30 09:31:21 +00:00
README.SUSE - restrict D-Bus access to tpm2-abrmd to members of the tss group 2022-04-04 10:57:16 +00:00
tpm2-abrmd-2.4.1.tar.gz Accepting request 987866 from home:aplanas:branches:security 2022-07-08 09:24:21 +00:00
tpm2-abrmd-2.4.1.tar.gz.asc Accepting request 987866 from home:aplanas:branches:security 2022-07-08 09:24:21 +00:00
tpm2-abrmd.keyring Accepting request 987866 from home:aplanas:branches:security 2022-07-08 09:24:21 +00:00
tpm2.0-abrmd.changes Accepting request 987866 from home:aplanas:branches:security 2022-07-08 09:24:21 +00:00
tpm2.0-abrmd.rpmlintrc - Update to version 2.0.1: 2018-08-10 10:31:50 +00:00
tpm2.0-abrmd.spec Accepting request 987866 from home:aplanas:branches:security 2022-07-08 09:24:21 +00:00

The tpm2-abrmd by upstream default allows every local users in the system to
access the TPM chip and modify its settings (bsc#1197532). Upstream suggests
to use the TPM's internal security features (e.g. password protection) to
prevent local users from manipulating the chip without authorization. Still
the default behaviour that every user in the system can access TPM features
without any authentication could come as a surprise to end users and system
integrators alike.

For this reason on SUSE only members of the 'tss' group are allowed to access
the tpm2-abrmd D-Bus interface, thereby mirroring the access permissions of
the /dev/tpm0 and /dev/tpmrm0 character devices.