Commit Graph

  • f1b8a7e901 Accepting request 1151833 from security factory slfo-main slfo-1.2 Ana Guerrero 2024-02-26 18:49:43 +00:00
  • 99c8e2f761 Accepting request 1151830 from home:pgajdos:t Wolfgang Frisch 2024-02-26 16:04:32 +00:00
  • 6d02be0db4 Accepting request 1135990 from security Dominique Leuenberger 2024-01-03 11:27:52 +00:00
  • a037baaf30 Accepting request 1135798 from home:gcomes.obs Marcus Meissner 2024-01-01 16:09:21 +00:00
  • c1dd9c8cf3 Accepting request 1088963 from security Dominique Leuenberger 2023-05-25 21:52:29 +00:00
  • 9b6c692bd7 Accepting request 1088961 from home:jsrain:branches:security Marcus Meissner 2023-05-25 07:00:09 +00:00
  • 8fc3669ea1 Accepting request 998773 from security Dominique Leuenberger 2022-08-24 13:10:38 +00:00
  • 2f8d287ade Accepting request 998581 from home:dimstar:Factory Matthias Gerstner 2022-08-23 08:31:16 +00:00
  • 74ef921514 Accepting request 970851 from security Dominique Leuenberger 2022-04-22 19:52:45 +00:00
  • 6d9ecdaaf6 - changed urls to https (except main URL which has no https) Marcus Meissner 2022-04-12 13:58:41 +00:00
  • cafd5df7f8 Accepting request 934587 from security Dominique Leuenberger 2021-12-01 19:46:58 +00:00
  • 26345071cc Accepting request 933796 from home:jsegitz:branches:systemdhardening:security Matthias Gerstner 2021-11-29 15:44:05 +00:00
  • 382c2d112d Accepting request 923191 from security Richard Brown 2021-10-08 20:04:47 +00:00
  • 27dfb7e0fd - move libraries to /usr/lib (bsc#1191102) Matthias Gerstner 2021-10-05 09:41:59 +00:00
  • 93f003414b Accepting request 846199 from security Dominique Leuenberger 2020-11-05 20:55:41 +00:00
  • 5258da8497 - adjusted %setup macro invocation which seemed to be wrong Matthias Gerstner 2020-11-05 10:55:21 +00:00
  • f7274415fe - update to new upstream version 0.3.15: - Corrected mutliple security issues that existed if the tcsd is started by root instead of the tss user. CVE-2020-24332, CVE-2020-24330, CVE-2020-24331 - Replaced use of _no_optimize with asm memory barrier - Fixed multiple potential instances of use after free memory handling - Removed unused global variables which caused build issue on some distros - drop gcc-10.patch: now contained in upstream tarball - drop bsc1164472.patch: now contained in upstream tarball Matthias Gerstner 2020-11-05 10:36:08 +00:00
  • 087082c045 Accepting request 822938 from security Dominique Leuenberger 2020-07-27 15:47:37 +00:00
  • d563a9dd49 - In a previous commit the Requires line for the tss user got accidentally dropped. This change reintroduces it. Matthias Gerstner 2020-07-27 08:14:38 +00:00
  • b16c32f901 Accepting request 810797 from security Dominique Leuenberger 2020-06-02 12:42:58 +00:00
  • 2af8e2ea3a Accepting request 810796 from home:mgerstner:branches:security Matthias Gerstner 2020-06-02 10:30:48 +00:00
  • af1b67abea Accepting request 807580 from security Yuchen Lin 2020-05-23 15:26:43 +00:00
  • f9db7cbc97 require /etc/tcsd.conf to be owned by root:tss mode 0640. Matthias Gerstner 2020-05-20 10:29:52 +00:00
  • 5000c171fa - get rid of %pre/%post logic that fixes the old packaging bug. Turns out %pretrans and %posttrans had their purpose before, because the logic needed to run before old files owned by the package got deleted. But I'm not reimplementing this strange logic in Lua ... users that didn't get the fix yet will have to live with it. Matthias Gerstner 2020-05-20 10:07:53 +00:00
  • 8baf3baff8 - fix a potential tss user to root privilege escalation when running tcsd (bsc#1164472). To do this run tcsd as the 'tss' user right away to prevent badly designed privilege drop and initialization code to run. - add bsc1164472.patch: additionally harden operation of tcsd when running as root. No longer follow symlinks in /var/lib/tpm. Drop gid to tss main group. Matthias Gerstner 2020-05-20 09:50:09 +00:00
  • 3a2dd77c87 OBS-URL: https://build.opensuse.org/package/show/security/trousers?expand=0&rev=70 Matthias Gerstner 2020-05-19 11:49:01 +00:00
  • cc956f2894 - add correct Requires(pre) and change %pretrans and %posttrans into %pre and %post. %pretrans can't have any dependencies and therefore can only be %implemented in lua. This currently leads to build errors "/bin/sh: no such file or directory". Matthias Gerstner 2020-05-15 10:04:12 +00:00
  • ccbbe7c311 OBS-URL: https://build.opensuse.org/package/show/security/trousers?expand=0&rev=68 Matthias Gerstner 2020-05-14 07:48:50 +00:00
  • 5432fa5a15 - add explicit dependency to bash to try to workaround recent build errors failing to execute %pretrans: error: failed to exec scriptlet interpreter /bin/sh: No such file or directory error: %pretrans(trousers-0.3.14-82.3.aarch64) scriptlet failed, exit status 127 Matthias Gerstner 2020-05-13 12:21:08 +00:00
  • 2f76fcfd0e Accepting request 777248 from security Dominique Leuenberger 2020-02-20 13:55:29 +00:00
  • ce94032d0a - leave creation of /var/lib/tpm to the new system-user-tss package. Otherwise we're getting conflicts in packages depending on trousers (bsc#1162360). Matthias Gerstner 2020-02-19 12:49:22 +00:00
  • 6b691b15bc Accepting request 769067 from security Dominique Leuenberger 2020-02-10 20:52:57 +00:00
  • 8c964ed338 Accepting request 769045 from home:michals Matthias Gerstner 2020-01-31 14:00:23 +00:00
  • fb392bff0d Accepting request 750985 from security Dominique Leuenberger 2019-11-26 16:05:11 +00:00
  • 7555ca7f4f - Fix a local symlink attack problem with the %posttrans scriptlet (bsc#1157651, CVE-2019-18898). A rogue tss user could have used this attack to gain ownership of arbitrary files in the system during installation/update of the trousers package. Matthias Gerstner 2019-11-26 09:26:21 +00:00
  • b3c2f7518f Accepting request 729491 from security Dominique Leuenberger 2019-09-09 22:04:40 +00:00
  • faf8c811fd - add fix-lto.patch: This fixes the rpmlint error: trousers-devel.x86_64: E: lto-no-text-in-archive (Badness: 10000) /usr/lib64/libtddl.a objcopy/strip seem not to support the LTO linking and discard the actual text section from libtddl.a. By passing -ffat-lto-objects the object format is kept compatible with unaware tools and fixes the error. Matthias Gerstner 2019-09-09 14:15:02 +00:00
  • eb14ad4d31 Accepting request 698144 from security Yuchen Lin 2019-04-26 20:55:00 +00:00
  • eecd206a1e Accepting request 698138 from home:jubalh:branches:security Matthias Gerstner 2019-04-26 10:41:50 +00:00
  • 35db509071 reword comment Matthias Gerstner 2018-10-30 10:53:48 +00:00
  • c14b2b5b88 Accepting request 644837 from security Dominique Leuenberger 2018-10-29 13:21:50 +00:00
  • 934b16a264 - fix mode of /var/lib/tpm, was missing the execute bit in the previous version. - implement a backup and restore logic for /var/lib/tpm/system.data.* to prevent removal of validly stored trousers state during update. See previous comment for the packaging error that leads to this requirement. Matthias Gerstner 2018-10-26 11:22:47 +00:00
  • b603d436ea Accepting request 644307 from security Dominique Leuenberger 2018-10-25 07:12:47 +00:00
  • ee6ab47a43 fix group access of state dir Matthias Gerstner 2018-10-24 13:01:28 +00:00
  • d457a441b3 - fix wrong installation of system.data.{auth,noauth} into /var/lib/tpm. These files are only sample files that *can* be used to fake that ownership was already taken by trousers, when other TPM stacks did that already. These files should not be there by default. Therefore install them into /usr/share/trousers instead, to allow the user to use them at his own discretion (fixes bsc#1111381). Matthias Gerstner 2018-10-24 12:44:49 +00:00
  • 08a43d2adf Accepting request 461328 from security Dominique Leuenberger 2017-03-03 16:45:43 +00:00
  • 9d0298a56b - trousers-wrap_large_key_overflow.patch: Do not wrap keys larger than Marcus Meissner 2017-03-01 11:06:43 +00:00
  • 396c095a23 2048 bit, as the space on the TPM is limited to that amount. (bnc#868933) Marcus Meissner 2017-03-01 11:06:27 +00:00
  • 4daa43bcec - trousers-wrap_large_key_overflow.patch: do not wrap keys larger than 2048 bit, as there is not more space. (bnc#868933) Marcus Meissner 2017-03-01 11:06:03 +00:00
  • b346072b95 OBS-URL: https://build.opensuse.org/package/show/security/trousers?expand=0&rev=46 Marcus Meissner 2017-03-01 11:05:20 +00:00
  • 256d17266e - Update to version 0.3.14 (see ChangeLog) (FATE#321450) Marcus Meissner 2017-03-01 11:02:38 +00:00
  • fade4246f7 Accepting request 448375 from security Dominique Leuenberger 2017-01-09 10:53:51 +00:00
  • 88320a09f5 Accepting request 448364 from home:Mailaender:branches:security Marcus Meissner 2017-01-01 09:45:39 +00:00
  • 8be795f55c Accepting request 394121 from security Dominique Leuenberger 2016-05-10 07:27:41 +00:00
  • ab36a52c52 OBS-URL: https://build.opensuse.org/package/show/security/trousers?expand=0&rev=41 Marcus Meissner 2016-05-07 08:31:44 +00:00
  • 560f899de3 Accepting request 394095 from home:jengelh:branches:security Marcus Meissner 2016-05-07 08:25:40 +00:00
  • 8258980e2c Accepting request 312835 from security Dominique Leuenberger 2015-06-23 09:58:47 +00:00
  • b1a3261e53 Accepting request 312755 from home:elvigia:branches:security Marcus Meissner 2015-06-20 12:01:55 +00:00
  • 7e63d3d7fc Accepting request 294720 from security Dominique Leuenberger 2015-04-10 07:51:05 +00:00
  • c7e24a8808 Accepting request 294163 from home:pluskalm:branches:security Marcus Meissner 2015-04-07 09:49:50 +00:00
  • 0b9895ddc2 Accepting request 236160 from security Stephan Kulow 2014-06-05 08:49:57 +00:00
  • 4cad349ee8 - updated to trousers 0.3.13 (bnc#881095 LTC#111124) - Changed exported functions which had a name too common, to avoid collision - Assessed daemon security using manual techniques and coverity - Fixed major security bugs and memory leaks - Added debug support to run tcsd with a different user/group - Daemon now properly closes sockets before shutting down * TROUSERS_0_3_12 - Added new network code for RPC, which supports IPv6 - Users of client applications can configure the hostname of the tcsd server they want to connect through the TSS_TCSD_HOSTNAME env var (only works if application didn't set a hostname in the context) - Added disable_ipv4 and disable_ipv6 config options for server - removed trousers-wrap_large_key_overflow.patch: upstream - removed trousers-0.3.11.2.diff: solved upstream now Marcus Meissner 2014-06-03 15:37:04 +00:00
  • a9eab335e8 Accepting request 226744 from security Stephan Kulow 2014-03-21 13:06:49 +00:00
  • ac8240d1b9 - trousers-wrap_large_key_overflow.patch: do not wrap keys larger than 2048 bit, as there is not more space. (bnc#868933) Marcus Meissner 2014-03-19 13:00:26 +00:00
  • f58aa1f0e7 Accepting request 213873 from security Stephan Kulow 2014-01-20 15:24:52 +00:00
  • b12d4d8d01 - Updated to trousers 0.3.11.2 - license changed to BSD-3-Clause - various bug and manpage fixes - trousers-0.3.10.diff renamed and rebased to trousers-0.3.11.2.diff Marcus Meissner 2014-01-14 10:47:36 +00:00
  • fc2b68170b Accepting request 137388 from security Stephan Kulow 2012-10-07 18:05:06 +00:00
  • 0f523cef57 - updated to trousers 0.3.10 - bugfixes - context checking Marcus Meissner 2012-09-28 14:52:23 +00:00
  • bbbd3c5f8b Accepting request 122685 from security Stephan Kulow 2012-05-31 15:11:08 +00:00
  • bf627198e3 - Updated to trousers 0.3.9 - lots of bugfixes Marcus Meissner 2012-05-18 09:08:24 +00:00
  • 043c3e24fd Accepting request 111595 from security Stephan Kulow 2012-03-29 05:49:01 +00:00
  • 9edf21a48e - Updated to TROUSERS_0_3_8 - Fix ssl_ui.c overflow - Handling of TPM_CERTIFY_INFO2 structure special case - Fix possible obfuscation of obj_migdata.c errors. - Make 1.2 keys respect the TPM_PCRIGNOREDONREAD flag. - PCRInfo member allocation in Trspi_Unload_CERTIFY_INFO. - Add functions for deserializing NVRAM related data structures - Add NVRAM specific error messages - Fix spec file so one can build an rpm - Initialize the tcsd_config_file with NULL. - support for -c <configfile> command line option - Establish a .gitignore file - ENDIAN_H and htole definition fix Marcus Meissner 2012-03-28 15:05:17 +00:00
  • 883de7ed0b Accepting request 109093 from security Stephan Kulow 2012-03-17 12:23:26 +00:00
  • 6fb4b0d1ad Accepting request 109060 from home:babelworx:ldig:branches:security Marcus Meissner 2012-03-13 12:13:09 +00:00
  • 7f0e0ba281 Accepting request 92910 from security Stephan Kulow 2011-11-22 16:49:45 +00:00
  • c35f4d6670 Accepting request 92562 from home:coolo:removelibtool Pavol Rusnak 2011-11-21 17:12:46 +00:00
  • 07f628b33f Autobuild autoformatter for 74198 Sascha Peilicke 2011-06-30 14:24:44 +00:00
  • ca1106ba56 Accepting request 74198 from security Sascha Peilicke 2011-06-30 14:24:31 +00:00
  • 022e04cd43 Accepting request 74187 from home:msmeissn:branches:security Marcus Meissner 2011-06-20 12:14:06 +00:00
  • 2dcab22b0f Accepting request 49141 from security OBS User autobuild 2010-09-27 08:29:09 +00:00
  • ae016dcebf Updating link to change in openSUSE:Factory/trousers revision 16.0 OBS User buildservice-autocommit 2010-09-27 08:29:09 +00:00
  • fa58a34107 Accepting request 49137 from home:oertel:branches:openSUSE:Factory Cristian Rodríguez 2010-09-27 04:37:46 +00:00
  • 0b395bf07e Accepting request 46629 from security OBS User autobuild 2010-08-30 10:24:37 +00:00
  • d7263c793d Updating link to change in openSUSE:Factory/trousers revision 15.0 OBS User buildservice-autocommit 2010-08-30 10:24:37 +00:00
  • c5913cebee Accepting request 46629 from security OBS User autobuild 2010-08-30 10:24:36 +00:00
  • e0d9d82cac - Updated to TROUNSERS_0_3_6 - Fixed a number of warnings during a build with --debug regarding THREAD ID definition - Removed htole() dependency, which was included only in glibc 2.9 - Updated to TROUSERS_0_3_5 - Allowed TCD Daemon to run with reduced privileges In Solaris. - Fixing previous kfreebsd build patch conflict with the current tree. - TCSD error handling improvements. - mutex init inclusion. - pthread_t portability fix - Owner Evict keys load fix. - Big- endian issues. - Memory leak fix. - Adding missing #include <limits.h>. - kfreebsd build fixes. - Fixed usage of syslog(). - 64bits clean - Fixes the TCP UN and IN socket connection attempt handling - Fixes logic on opening a hardware TPM. - Added communication through TCP to software TPMs in TrouSerS. - Fixed conflicting defines - Adds missing free() - Fixed fread() return value check. - Made the previous fix cleaner and more robust. - Added missing check in order to avoid freeing buffer that's out of Tspi_Data_Seal() scope. - Fixed Tspi_TPM_GetRandom 4kb output limit. Marcus Meissner 2010-08-11 08:59:03 +00:00
  • 2724c92e4b Accepting request 42074 from security OBS User autobuild 2010-06-28 09:41:40 +00:00
  • 681bc5bf89 Accepting request 42074 from security OBS User autobuild 2010-06-28 09:41:39 +00:00
  • 0c6b66567e Accepting request 41850 from home:elvigia:branches:security Pavol Rusnak 2010-06-25 15:54:12 +00:00
  • f132b225ce Accepting request 35169 from security OBS User autobuild 2010-03-19 08:33:53 +00:00
  • a7b8277a67 Accepting request 35169 from security OBS User autobuild 2010-03-19 08:33:53 +00:00
  • 5cdbdc242c libtool misfuckup Marcus Meissner 2010-03-18 10:35:06 +00:00
  • ad6ab2150a - Updated to TROUSERS_0_3_4 - Fixed TrouSerS mishandling of TPM auth sessions - Enabled hosttable.c "_init" and "_fini" functions to work on Solaris - Included Solaris in BSD_CONST definition conditional - Made the init script LSB compliant - make distcheck improved - TROUSERS_0_3_3_2 - Fixed logic when filling up RSA keys objects. - TROUSERS_0_3_3_1 - TCSD now runs as tss and has a better signal handling - Fixed many memory handling issues - TROUSERS_0_3_3 - Tspi_ChangeAuth fixed for popup secret use case. - Prefixed exported functions with common names. - Fixed issues with accessing the utmp database. - Migrated the bios parser file handler from open to fopen. Marcus Meissner 2010-03-18 10:30:21 +00:00
  • b7ffe2d466 Accepting request 31038 from home:jengelh:baselibs Marcus Meissner 2010-02-02 10:09:32 +00:00
  • f89cc4fd97 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/trousers?expand=0&rev=10 OBS User autobuild 2010-03-18 15:32:57 +00:00
  • ceb3d4a394 Accepting request 19062 from security OBS User autobuild 2009-08-28 19:52:58 +00:00
  • ff6429959d OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/trousers?expand=0&rev=7 OBS User unknown 2009-06-14 22:55:16 +00:00
  • 274e6bcaf7 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/trousers?expand=0&rev=6 OBS User unknown 2009-04-19 22:37:31 +00:00
  • 8ffd29a5b9 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/trousers?expand=0&rev=5 OBS User unknown 2008-09-02 16:22:48 +00:00
  • 477c0013c2 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/trousers?expand=0&rev=4 OBS User unknown 2008-08-28 00:24:16 +00:00