trousers-0.3.15-150400.3.3.19<>,SPf۠p9|uU]!A I&,s `6<ƼC:-xD6;,H4|?4ld   V!BO e{  \    d  pIp\x(8 9 : =(b>(j?(r@(zF(G(H(I)HX)`Y)l\)]*^+ b+c,d-e-f-l-u-,v-w/x/Xy/ z//444 4&4hCtrousers0.3.15150400.3.3.19TSS (TCG Software Stack) access daemon for a TPM chipThe trousers package provides a TSS implementation through the help of a user-space daemon, the tcsd, and a library Trousers aims to be compliant to the 1.1b and 1.2 TSS specifications as available from the Trusted Computing website http://www.trustedcomputinggroup.org/. The package needs the /dev/tpm device file to be present on your system. It is a character device file major 10 minor 224, 0600 tss:tss.f۠s390zl34 SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Productivity/Securityhttp://trousers.sourceforge.net/linuxs390x/usr/bin/getent group tss >/dev/null || /usr/sbin/groupadd -g 98 tss || : /usr/bin/getent passwd tss >/dev/null || \ /usr/sbin/useradd -u 98 -o -g tss -s /bin/false -c "TSS daemon" \ -d /var/lib/tpm tss || : if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : for service in tcsd.service ; do sysv_service=${service%.*} if [ ! -e /usr/lib/systemd/system/$service ] && [ ! -e /etc/init.d/$sysv_service ]; then mkdir -p /run/systemd/rpm/needs-preset touch /run/systemd/rpm/needs-preset/$service elif [ -e /etc/init.d/$sysv_service ] && [ ! -e /var/lib/systemd/migrated/$sysv_service ]; then /usr/sbin/systemd-sysv-convert --save $sysv_service || : mkdir -p /run/systemd/rpm/needs-sysv-convert touch /run/systemd/rpm/needs-sysv-convert/$service fi done fi if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" ]; then /usr/bin/systemctl daemon-reload || : fi for service in tcsd.service ; do sysv_service=${service%.*} if [ -e /run/systemd/rpm/needs-preset/$service ]; then /usr/bin/systemctl preset $service || : rm "/run/systemd/rpm/needs-preset/$service" || : elif [ -e /run/systemd/rpm/needs-sysv-convert/$service ]; then /usr/sbin/systemd-sysv-convert --apply $sysv_service || : rm "/run/systemd/rpm/needs-sysv-convert/$service" || : touch /var/lib/systemd/migrated/$sysv_service || : fi done fi /usr/bin/udevadm trigger -s tpm || : # bsc#1164472: adjust potential root ownership to allow tcsd to open the file # as unprivileged user. Be careful not to follow a symlink target. system_data=/var/lib/tpm/system.data if [ -e "${system_data}" ]; then chown --no-dereference tss:tss /var/lib/tpm/system.data fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable tcsd.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop tcsd.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ $1 -eq 0 ]; then # Package removal for service in tcsd.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done fi if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart tcsd.service ) || : fi fi.\W"#]~^^A큤A큤Af۞f۞f۞f۟f۞f۟^S_L^S^S^S^S^S^S^S^Sf۞f۞f۞^S^Sf۞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-0.3.15-150400.3.3.19.src.rpmconfig(trousers)trouserstrousers(s390-64) @@@@@@@@@@@@    /bin/sh/bin/sh/bin/sh/bin/sh/bin/shconfig(trousers)coreutilscoreutilslibc.so.6()(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2)(64bit)libpthread.so.0(GLIBC_2.3.2)(64bit)pwdutilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)udev0.3.15-150400.3.3.193.0.4-14.6.0-14.0-15.2-14.14.3f @a\>@^˳@][GXh@W,@U@U/@Smatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commailaender@opensuse.orgjengelh@inai.decrrodriguez@opensuse.orgmpluskal@suse.commeissner@suse.com- fix runtime requirements for stat and udevadm (bsc#1221770). On minimal systems this can cause the %pretrans or %post scriptlets to fail because of missing tools.- update to new upstream version 0.3.15 (jira#SLE-18269): - Corrected mutliple security issues that existed if the tcsd is started by root instead of the tss user. CVE-2020-24332, CVE-2020-24330, CVE-2020-24331 - Replaced use of _no_optimize with asm memory barrier - Fixed multiple potential instances of use after free memory handling - Removed unused global variables which caused build issue on some distros - drop bsc1164472.patch: now contained in upstream tarball - adjusted %setup macro invocation which seemed to be wrong- fix a potential tss user to root privilege escalation when running tcsd (bsc#1164472). To do this run tcsd as the 'tss' user right away to prevent badly designed privilege drop and initialization code to run. - add bsc1164472.patch: additionally harden operation of tcsd when running as root. No longer follow symlinks in /var/lib/tpm. Drop gid to tss main group. require /etc/tcsd.conf to be owned by root:tss mode 0640.- Fix a local symlink attack problem with the %posttrans scriptlet (bsc#1157651, CVE-2019-18898). A rogue tss user could have used this attack to gain ownership of arbitrary files in the system during installation/update of the trousers package.- fix wrong installation of system.data.{auth,noauth} into /var/lib/tpm. These files are only sample files that *can* be used to fake that ownership was already taken by trousers, when other TPM stacks did that already. These files should not be there by default. Therefore install them into /usr/share/trousers instead, to allow the user to use them at his own discretion (fixes bsc#1111381). - implement a backup and restore logic for /var/lib/tpm/system.data.* to prevent removal of validly stored trousers state during update.- Update to version 0.3.14 (see ChangeLog) (FATE#321450)- Check for user/group existence before attempting to add them, and remove error suppression from these calls. - Avoid runtime dependency on systemd, the macros can all deal with its absence.- Force GNU inline semantics, fixes build with GCC5- Cleanup spec-file with spec-cleaner - Update prerequires - Use systemd unit file * replace tcsd.init with tcsd.service- updated to trousers 0.3.13 (bnc#881095 LTC#111124) - Changed exported functions which had a name too common, to avoid collision - Assessed daemon security using manual techniques and coverity - Fixed major security bugs and memory leaks - Added debug support to run tcsd with a different user/group - Daemon now properly closes sockets before shutting down * TROUSERS_0_3_12 - Added new network code for RPC, which supports IPv6 - Users of client applications can configure the hostname of the tcsd server they want to connect through the TSS_TCSD_HOSTNAME env var (only works if application didn't set a hostname in the context) - Added disable_ipv4 and disable_ipv6 config options for server - removed trousers-wrap_large_key_overflow.patch: upstream - removed trousers-0.3.11.2.diff: solved upstream now/bin/sh/bin/sh/bin/sh/bin/shs390zl34 1721031584 0.3.15-150400.3.3.190.3.15-150400.3.3.190.3.15-150400.3.3.19 tcsd.conftcsd.service91-trousers.rulesrctcsdtcsdtrousersAUTHORSChangeLogLICENSELTC-TSS_LLD_08_r2.pdfLTC-TSS_LLD_08_r2.sxwNICETOHAVESREADMEREADME.selinuxTODOTSS_programming_SNAFUs.txttcsd.conf.5.gztcsd.8.gztrouserssystem.data.authsystem.data.noauthtpm/etc//usr/lib/systemd/system//usr/lib/udev/rules.d//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/trousers//usr/share/man/man5//usr/share/man/man8//usr/share//usr/share/trousers//var/lib/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:33188/SUSE_SLE-15-SP4_Update/159c6189c2888e1f144b776f98e388d1-trousers.SUSE_SLE-15-SP4_Updatedrpmxz5s390x-suse-linuxASCII textELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=066687e65a5d7559d39eb4ef4355cb786dc9c58f, for GNU/Linux 3.2.0, strippeddirectoryASCII text, with no line terminators (OpenOffice.org 1.x Writer document)troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) RR RR R R R RRRRR{lD# this scriplet and the counterpart in %posttrans work around a packaging bug # that was present in all trousers packages since around 2008 until 2018. # /var/lib/tpm/system.data.* was wrongly packaged as runtime state data # instead of package resource data in /usr/share. After removal of these files # from packaging, during updating they will be deleted. Since users could have # created their own versions of the files already (by taking ownership of a # TPM) we want to keep those files in place. # # to achieve this we use the ownership of /var/lib/tpm as an indicator. # Versions that still wrongly package those files also had the ownership of # the directory wrong. Therefore if the directory is not owned by the tss user # we apply a backup and restore logic. [ ! -d "/var/lib/tpm" ] && exit 0 OWNER=`/usr/bin/stat -c "%U" "/var/lib/tpm"` [ "$OWNER" = "tss" ] && exit 0 for data in system.data.auth system.data.noauth; do file="/var/lib/tpm/${data}" [ ! -e "$file" ] && continue cp -p $file ${file}.rpmsave echo "saving backup of $file" done/bin/shutf-89fce036e21cf6b75667e03c129d3f94973a0083055357b93fe0f42666251d656?7zXZ !t/DY]"k%{f60c>ͱ;jAmQ"޹ݭzPsEM>`aCqzysBObWBDUoP+v#,]NBc`d`{MVpL 6'̵bLO`D{ W}u>2yVMg}8voд˟fMAo5ؙgOw0U:`)䖩~زF]9J2c!?]}eg6` |D"zk {4%|Wf ʗv{N3Lԙyk*7Ρ^pSl-ت?9B~FO)+ 0xDڄE-gej3|n&E'f]f)ǫ[ӰBo ƑhǪH.*IE;`#쥽|0tjǬWeDdmZN4?0H]j} 5<7$;ϠH%\Ǫs|6x.(y.CB4EU\7hbNJ2J ms\Ӗ`, J0'bܐ\ GdĸhLw!ЍoY4'CVbo2ܪZdB])O?r9]lIOٽP46_Ib7`/@m.HgOooXcTLIse=IvS`3 WPot S elZvL$bnHH,M1h14%5; N#rAX2G!]pDlG D;>>oA$"@70uy ՎcSךKO?'bL H r!rHnBuN[jȕTNA0t<"=& ڄXylb}b?D/=62r1+UN7^D~"31zȹkHL˶r?#IJ"j b!*#/Tż]:\PKEǹxpmcԻ' @ ѷ5YzFil4y-(gY#D2e%P КR%l|]@H&糂2{"l7ÇmλԪbzn8( HسkbbG?Mph]Gr9ۘ.uy͂(F+iRtf>"jֺwEZت3 M@tm+Iv|E/9kkn0!Lxԭ2)-x:p~$.|!^(5x#2rG:JJo/ lP:&~nwj܎ܸ 16k6^_Nز HTdDhG5jK;Gti`دFHMQH,ϕix؛KbUxEg4䇑 aSF$U ȍL5$NnAtESqF1R3a۫qc\U1y-/ ?,՘efrx!QWE.],u4= ȍ IM>&^SΒV~̡r0)Dp<I+:_MBmS Ud@ q8s)aUc6ƧyJ`g4O'it $8+e_keunRNڍw!+VxTL85ѯY,ӊs7*e!)Խ 7:+k>:ҘYF$:c~:ۘH,p+:>:ǐ;K2EE(u,o-S˅`hMey+1YMW}0w5($1rMA\&ݜ~\:Ì+O;|~VkpxU`x*8hatb΋1x w! l[rԫKA~ [<¯C>o-WXfȂh݅Vt2)<:dV 4k.$\Jh72TNP*!v##F,ʼnIZ (wN4R7-,A \2Yy8muYb8adLPԗL$buVT B!n'T6Ν(&pSm^(A\WꭠH ^Hfy %{#NJA2֚n/wo*ܾ% a bwL<3375Y)ں\AbFr "W&m^+ZrP=wxCzQTL8i,RE>|sehٝ%aa5i~ YU/2 Dh^r#lV:(*^|2Pu'ij_&˼9N_ -[ߩJW0uleB3J9%C^jI$\aҸ2a/rn0<8?^R 2󡩣B._i <6(bl L:^C {ѷGpIpoH+irz/\6 Qm/иQG 0Ш7?Ci^-3E֊pu.`ɸZ~nٚ&Zҕv2M^B&F6i^˗ ^/[ĊQJ$(^)hCDDݝy-]ՂI@{-?biM``sh$'1FlG/&ʭ%DYGBWM]ңmqNZ[{hF8JEь 1_= j{C]a},h8W~#(jUjY4ݘN@'։ha_D?k ̨aJTfW/-oT oMK>;IO^3e-"Iagtʁp4y=ki掍^dusj0rY':VY* e&uhG8P oL,Q]K*OdQz3e]D*ʙ@&Rrs.|HNKRńmE%0ThO]dkuk4Zod,֯nB\ҥ>l1;p%=[Jfi"0=:UqOMfFt9/v=T&0|>*1d!B1jVO$ц2am8^>Y㈙34$ok>3T6h~K*A]_<@' ESUZ̨_s в@ !BGjvY''lyiJ,+bG MLܵj$WR j ps JNݢd21BbFd몒Ak2\>i\ e\uK#6&ȓw_+OкfUC=f ,3N?A&rP%Ў 3znOh ?c)#iZ8S~yHN$hkV~T2(OHy-=A -;VXGj/2Nj8YPW>(D~!X׮a+` |v꨻!`)D>.+Sͤ=9+wž3a#T3Ck{3a<,(:Cr,bB3ב?&vn-JCa80܊,$_JK_CtT %HB0[əTOSw}.1\gH? Xc(-Q_Z:.LE6/cJJ$j(3@s'kvl;vKll^1|$GPdcKh"LBWTn43 A 0rω'{'ua̱(dJҎw(o $bm!\>gn [w'Y/( }@!G)7Ѝɮ$wJ2 bE)媩eDʧ;.֦x|7[?֨$5C$Boo$'g$M-`a,37Xyɨsdcd` nro6;N%4Ќ}6 cƏ)aݺ1uaB/T#f|IgͰ9va;R\04I(7avggyޅ}7 |Ύ"(6u;b l"KP$A Xz<_ѹJL{cFX>jNiۻ8H4r+u7̌䕑G-vD?_ُ,('%7 WE$:0 3SE,F(F:chס}H,\ Rj8z-`$CDmuف:'Ka5K~oRq.K^OSAuZ\\LD| ra1գ<  aGȯwhH;E< E.4_٧ Y8ZNx [ҼuM 5gU@9"Ѿ()$PKbu1A?mue"$hk$dV#MI);Z JO%#A^g4ڈ؉ YZ