libtpms0-0.9.6-150600.3.3.1<>,]Liˋlp9|+R>KRs6('gj }|ތ_ F^ּkNyNY[ ~ y#1]߈{Ch3_tǝO?2v5@cSXTIv `]:X g7qFdSojK?5|mҖD l sD}BVX]м776{p&9&m?%+\^>֍.!5U@1 )he:]K@%x?%hd   \ %Ems|      /Rx 4 " (D8L9:> @!F!G!0H!LI!hX!pY!\!]!^"b"c#6d#e#f#l#u#v#w$x$y$z%%%%"%dClibtpms00.9.6150600.3.3.1Library providing Trusted Platform Module (TPM) functionalityA library providing TPM functionality for VMs. Targeted for integration into Qemu.iˋlibs-power9-21WSUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Libraries/C and C++https://github.com/stefanberger/libtpmslinuxppc64le+ lA큤A큤iˋPiˋPiˋkcjcjiˋkcj7ecaeb08cd95b92b7b252570ad91c5153b94dd63d3fbe011de1d23fb2c55d3d3e65f1b5ea68bf6728fcc0856e0dd8b8699ec672725c68a8862ca39059fd928e8d73e909e8e84c2f056fa0dbac2266a3aeeab10426251f0079bbac23281fea9e382f1e6bae374bb6a9d4f4596767fd33e499718d560de140fd9f3d402cc5e41fblibtpms.so.0.9.6rootrootrootrootrootrootrootrootrootrootrootrootrootrootlibtpms-0.9.6-150600.3.3.1.src.rpmlibtpms.so.0()(64bit)libtpms.so.0(LIBTPMS_0.5.1)(64bit)libtpms.so.0(LIBTPMS_0.6.0)(64bit)libtpms0libtpms0(ppc-64)@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3iedGdc:@c@cRbRaa.au`}p`T@_@_{]p\NZ_:U ]@meissner@suse.commeissner@suse.comaplanas@suse.comdmueller@suse.compgajdos@suse.commeissner@suse.comdmueller@suse.comrpm@fthiessen.depgajdos@suse.comgmbr3@opensuse.orgglin@suse.comglin@suse.comglin@suse.comkai.liu@suse.comglin@suse.comglin@suse.comvcizek@suse.comp.drouand@gmail.com- CVE-2025-49133: Fixed potential out of bounds (OOB) read vulnerability (bsc#1244528) 0001-tpm2-Fix-potential-out-of-bound-access-abort-due-to-.patch- 0001-tpm2-Check-size-of-buffer-before-accessing-it-CVE-20.patch: Fixes CVE-2023-1017 & CVE-2023-1018: fixed memory corruptions in CryptParameterDecryption (bsc#1206022 bsc#1206023)- Update to 0.9.6: * CVE-2023-1018: tpm2: Fixed out of bounds read in CryptParameterDecryption (bsc#1206023) * CVE-2023-1017: tpm2: Fixed out of bounds write in CryptParameterDecryption (bsc#1206022) - 0001-tpm2-Check-size-of-buffer-before-accessing-it-CVE-20.patch: upstreamed- update to 0.9.5: * tpm2: Do not set RSA_FLAG_NO_BLINDING on RSA keys anymore * tpm2: Fix a potential overflow expression (coverity) * tpm2: Fix size check in CryptSecretDecrypt * tpm: #undef printf in case it is #define'd (OSS-Fuzz) * tpm2: Check return code of BN_div() * tpm2: Initialize variables due to gcc complaint (s390x, false positive) * tpm12: Initialize variables due to gcc complaint (s390x, false positive) * build-sys: Fix configure script to support _FORTIFY_SOURCE=3- fix build for ppc64le: use -Wl,--no-as-needed in check-local [bsc#1204556]- Added patches: 0001-tpm2-Reset-TPM2B-buffer-sizes-after-test-fails-for-v.patch 0002-tpm2-Add-maxSize-parameter-to-TPM2B_Marshal-for-sani.patch 0003-tpm2-Restore-original-value-if-unmarsalled-value-was.patch - CVE-2021-3623: Fixed out-of-bounds access when trying to resume the state of the vTPM (bsc#1187767)- update to 0.9.3: * build-sys: Add probing for -fstack-protector * tpm2: Do not call EVP_PKEY_CTX_set0_rsa_oaep_label() for label of size * (OSSL 3) * tpm2: When writing state initialize s_ContextSlotMask if not set- Update to version 0.9.1 * Downgrade to previous versions is not possible, as the size of the context gap has been adjusted to 0xffff from 0xff. * Enabled Camellia symmetric key encryption algorithm * tpm2: Update to TPM 2 spec rev 164 * tpm2: Added a cache for private exponent D and prime Q * tpm2: bug fixes - Fixed CVE-2021-3746 [bsc#1189935], out-of-bounds access via specially crafted TPM 2 command packets - Fixed CVE-2021-3623 (bsc#1187767) 0001-tpm2-Reset-TPM2B-buffer-sizes-after-test-fails-for-v.patch 0002-tpm2-Add-maxSize-parameter-to-TPM2B_Marshal-for-sani.patch 0003-tpm2-Restore-original-value-if-unmarsalled-value-was.patch- security update - added patches fix CVE-2021-3746 [bsc#1189935], out-of-bounds access via specially crafted TPM 2 command packets + libtpms-CVE-2021-3746.patch- Update to version 0.8.4: * Reset too large size indicators in TPM2B to avoid access beyond buffer * Restore original value in buffer if unmarshalled one was illegal - removed libtpms-CVE-2021-3746.patch- Update to version 0.8.2 * NOTE: Downgrade to 0.7.x or below is not possible. Due to fixes in the TPM 2 prime number generation code in rev155 it is not possible to downgrade from libtpms version 0.8.0 to some previous version. The seeds are now associated with an age so that older seeds use the old TPM 2 prime number generation code while newer seed use the newer code. * tpm2: rev155: Add new RsaAdjustPrimeCandidate code but do not use (bsc#1184939 CVE-2021-3505) * tpm2: Activate SEED_COMPAT_LEVEL_RSA_PRIME_ADJUST_FIX (bsc#1184939 CVE-2021-3505) * Update to TPM 2 code release 159 - X509 support is enabled + SM2 signing of ceritificates is NOT supported - Authenticated timers are disabled * Update to TPM 2 code relase 162 - ECC encryption / decryption is disabled * Fix support for elliptic curve due to missing unmarshalling code * Runtime filter supported elliptic curves supported by OpenSSL * Fix output buffer parameter and size for RSA decryption that could cause stack corruption under certain circumstances * Set the RSA PSS salt length to the digest length rather than max * Fixes to symmetric decryption related to input size check, defer padding to the user [EVP_CIPHER_CTX_set_padding(ctx, 0)] and to always use a temporary malloc'ed buffer for decryption * Fixed the set of PCRs belonging to the TCB group. This affects the pcrUpdateCounter in TPM2_Pcrread() responses, thus needs latest swtpm for test cases to succeed there.- Update to version 0.7.7 * CryptSym: fix AES output IV (bsc#1183729, CVE-2021-3446) * tpm2: Fix public key context save due to ANY_OBJECT_Marshal usage * tpm2: Address some Coverity issues (false positives) * tpm1.2: Backported ASAN/UBSAN related fixes * tpm2: Return properly sized array for b parameter for NIST P521 (HLK) * tpm2: Addressed issues detected by UBSAN * tpm2: Addressed issues detected by cppcheck (false positives)- Update to version 0.7.4 * Addressed potential constant-time related issues in TPM 1.2 and TPM 2 code TPM 1.2: RSA decryption TPM 2: EcSchnorr and EcSM2 signatures; Ecsda is handled by OpenSSL * Fixed some compilation issues- Update to version 0.7.3 * Fixed the set of PCRs belonging to the TCB group. This affects the pcrUpdateCounter in TPM2_Pcrread() responses, thus needs latest `swtpm` (master, stable branches) for test cases to succeed there. - Changes since version 0.7.2 * Fix output buffer parameter and size for RSA decryption that could cause stack corruption under certain circumstances * Set the RSA PSS salt length to the digest length rathern than max. possible * Fixes to symmetric decrytion related to input size check, defer padding to the user [EVP_CIPHER_CTX_set_padding(ctx, 0)] and to always use a temporary malloc'ed buffer for decryption - Changes since version 0.7.1 * tpm2: Fix TDES key creation by adding missing un-/marshalling functions * tpm2: Fix a bug in CheckAuthSession * compilation fixes for TPM 1.2 & TPM 2 and various architectures and gcc versions * Fix support for NIST curves P{192,224,521} and SM2 P256 and BNP648 that would not work; * Runtime filter elliptic curves (that OpenSSL does not support) and do not advertise those curves as capabilities * Removed unnecessary space in MANUFACTURER "IBM " -> "IBM"- Update to version 0.7.0 * fixes for TPM2 - Add gcc-c++ to BuildRequires- Update to version 0.6.0 * Introduce TPM2 support - Use %license tag for LICENSE- Update to version 0.6.0-dev1 * no upstream changelog * fix build with openssl 1.1 (bsc#1074801) - fix rpm group- Update to version 0.5.2 * No entry for this release - Update project home and download Urls - Add autoconf, automake and libtool build require; the tarball comes from git and configure script has to be generated/sbin/ldconfig/sbin/ldconfigibs-power9-21 17749471800.9.6-150600.3.3.10.9.6-150600.3.3.1libtpms.so.0libtpms.so.0.9.6libtpms0CHANGESREADMElibtpms0LICENSE/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libtpms0//usr/share/licenses//usr/share/licenses/libtpms0/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:43453/SUSE_SLE-15-SP6_Update/ee40b095d77e4f558d68cc664e4dc91c-libtpms.SUSE_SLE-15-SP6_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=6c9db0073f86475eef2904421c28975db1bd3341, strippeddirectoryASCII textPPPPRRRRmGzfHutf-8ef591b64c8d38b73a7ea1bd6ac7042e0a21754a3db2ef3a2486fb9924bf2a119?7zXZ !t/@3i]"k%r=dGk}$LY+L߸pc؆'F nZ,z,be =D,ئ4hI\,-[{ YUc' n{ YzH1ʝpҾ{uhxetC'b[$LR>|9a=gZPPb BgdTv4:c{9PT$!.G- Qw#鴒Q$ڜ݋by3kni4`54~sTgH^VFX^Aٴ~f(]k9kq~Z1FHi1dj S7 c9'#6 Y@1mk>T-^m8AJAЌ훰{A)LSŬGV )w# ٮ0^D{`q@d!F*{2OzQJ 3. =F6Dt?& hF6ǺyE#\#Du3YHO J4nMEGF&bH,vR#*`9 :8o=klb K-hc G͊ k<W Ȋ)}xrOE׍568߲VFk:XЊ3ni(q|ɮ冶P~4nԊ=k%@JS 9&2jbvgG@$eݬIwd=*.AY޾'/@똒C *Z-'@$Ϻ 1J&HV ZXtuDe#CѼM @vT(ޏU>y%bί Cm}o޲~Տ~\@g*sܨhl v歧yЗ a|髆y6!%?$=b\CЖhrEWUyWC$"ib=@M&&d)9Dd`:- ڮ'@`xg8xySŎh!u&h9e7QSFeN |49O"v&8w"t=cY^.A?b4ˁڝ^͟$;$`qAk59+61O^BCt}Z OPWIbR#?s3 ߞH Et"2'<gC.ش棅z4Dޣe"!7AL1 Z#1@\%D'? gFr1wGķ~?}-$z'm̢mx+{V]p/i0}A3TCsb Da- pf\>;1L~7k-i((J$Dhbx:hk%wz]$XNoif9Kߍ^uX JCD)OXd.2mr5M9%&ҋ 6 V%1_&nIxzed~0x\q8mqh-Z'5 䭦3XK?/|5E.sr{͏"J!ϚvfIFY~t9Ϊ"m o(JOs/ehl&&dx_,p,ISw_ k%yPC\. Ȓ'If0cF9+fNY,= P-v7ĭ;!&kuĜ8;wАn3IV-91Dj)av!N?_x~Idjm6VQUڎ :&-Ԁ_J8jޕSkM˚s<ԠrޅSCDV~#@tjxFZ{B:D^<^*y8)C]? D q<~pfQ"C8 jXӐQ^d=6:536}^ hÃ3B%$ ,N~oޯG@K4 e#=Wʘd]\*G*=ⅰֱS)*toP4̥ bPQZzⲘZ s?1DwB#b;d U,ƒ+d&9.?ߥ0.D݄0 X0s7*m>\bOJ$CHO"0;°_|GqD{AbGW%CYw2\3G}ί1]VMUH\DL/,PLߕNƞ5~0ʧ;a4lpRcŏ':_asJ}e"'3}=[ =/+]ɑ};ꍸ 9`2c$oߦ`#ӡ[G@s`kȉe1lvdT,v٦H|!@Ȯz2{l\se|yQْ!)[t6DYqOfV܌*G[2)U \gh&5vJ3d [0@,,Tc}]U @•5j= KgL)#%+򇺐PĎPu "!WS NkW aGwXV.򲞻!ӃLvc4 rsm2,8LY l]"Nvt<:@ aI^'+Kv($xP ±XJ'~^sׄdT`s; 6 E^Wwʿf$7w-VN2'ܖzX_ =]_r_kȬb+.Pb?1\t] /g=iHȈx p&VR[}Hm_f48$iccN _WdhF_PQ/Sc4ǃ##|z-A(YQ lHTbKErk>e-d *>oO9|lb&ΆZ~2^/^V_'}d'p;@4uZ?izyyDOxտlV cì`) /c4IXrិPgޛ3iU<:E1dGo~i6FɈEWv`FN>O `?!  #}BVזOYjdN|3"ߋa\#+' %ct ś]ISĦ:dU .TO齢??Z}Rci>YRUZak jiȮ `e`ڈi5>Oi\: ܥ3~gjS_K Ŏ)"_A%(|DE,] ]*F4 cB*NƮb C~5H &D80V7k9\to /tRK+^ 7Cp Lt+yuFx2d$$#/(pϷB/nH? Va4SWP4ĥ 6#r[ZX%ےHSQFhxGNoP c |"ij;rk-\syM}뵛;f_-T@R_*BR_,U1 }YPmk ʟM 5b4W*ϊ KleGQ* (J]_1L~vgi\#o{zhf@1n}r1|l H3 |oYٱ1SqQR2pR[a %fUN <źy3?.(B #֮S'CQ{O'eY`ƲdxK3L| J_եe@(WoA6B# ߀# 3=#7c$=rW m8q6p "t*Ʉ!2ىINtٶEoMCD|:'P\T~a"l /Bcjx[ #m,W(kXzbs#Ι~x+P$0Qb4p~z3uhP.>J~MhNm :ƌ(}~p$K5[S>KYv #PR Qѿoekpq^Ԝ^z5j"XiIO6EpCiB;Ы:q`EܾYMzw,p~q%xG3 +m(x3HogZqK"O5-Oar.#q;s>w>p @ ҂~0mZgřՔ==/S)F"L_mkYXE-s9aFwlH[s6z6S巸%&s.,~9-n I%YZ6R_o܄^"1ʉvԕ;whi)zW)[OT#q`~H.p q=oTכ-Z2;K:KPzь\ID+;yN^L%_lKkq\DdR&rR; nMXT`U F,;8͇7 u:ֶ ̾=, 񛱥>CdCY"69szC+۪^ڦ>8򇆌ݜ}SҬe1h"&yTfg7IN.LH*NMوk{[zcQ6ڠ}t̹g gw8s[*eFJz,K!y/0l8vWe7=6 khfR+ʉz*[6gz8i;yT`n)= <_`4l >&)`e|ro)w=x|oλU` QT( ]3Xg(B`]i殝bfTjCOdww\SkύʰjBuy6"3pneFqFEkAϋaM|%[,/!^ G.dWT|X\4Z1rߢ6I%?A;ΛF eaQ0bZ:%2v(ۡt]0}<^R>7OvU7% ݣL@ r7jk5we*0وHC'GZ+6d@qpkflvNQ#1瞨#AQäh5-37[ k(Wu~ŌIbQ$J] ..D0MG!Z2D,C*uDHAVXB*;1Pi,:L̼v3&Al74BO@5k/ |s8Unu wm&E3ۼ3okyO'$sҥ( ؆'+7`3}:CtX@KdO|V"*HtęHe8PB{ o#R͈VP-ϮŐd=@Xҫ[P1VIxo1iP*(p6kVZbğ.,-ߐG"԰!#M?{aOR)=|[.x&}垄%)ϊ4[Go O*j}- {w^z>IlwC2JD; b(9Eokߟ9I=WDF;+RMQ|QGJ/vt$Zw2 :PĬ:^\ܶ@٥)&_%EBՑFl,=[F]ں}eQҟL9W;yGSԆ0h&Ynvsz؉̝XH]@d^hSZ=dV[jY7m0@UPlpT7!/F3)K-Mw` -7>`Gh2t[+oK˓й3ҸԜonhrC⧄^M8‰iok'N-$ڄaPܭ 1IVwVV6x\s{(s n4^UgU6Gz1`LG ӊ\J z>Ŭ@a"5ܓF y,jC^TQzEw1o?BH@po\d'kbM1! t5B r-p:Pc{wX PYOSVʆqR2@3F"g۷T^pl8^!/g] +(F1yǣ]0-ڴ uͭ/9fUdY-6mW:&cq5鈕?hwd$E[l:;]`-60O%ߥ j;A՟ 2 '9)UJ^qx41E l+k"4ʝn*,C SGDS'*{8lMnpxf饖L@ŕclZ7c ۗ6EԗºPWC=հD?c0\斡t}3}"cTa57"jtw*KRNÎ\*^^KTjl'{F.AjI^B&aN?QP=("K K4CRΩK$&s1a2tWuG=3gƁ1u YZ