UbuntuUpdates.org

Package "libtspi-dev"

Name: libtspi-dev

Description:

open-source TCG Software Stack (development)

Latest version: 0.3.15-0.2
Release: jammy (22.04)
Level: base
Repository: universe
Head package: trousers
Homepage: http://trousers.sourceforge.net/

Links


Download "libtspi-dev"


Other versions of "libtspi-dev" in Jammy

No other version of this package is available in the Jammy release.

Changelog

Version: 0.3.15-0.2 2022-04-14 03:06:29 UTC

  trousers (0.3.15-0.2) unstable; urgency=medium

  * Non-maintainer upload
  * Remove invalid lintian override
  * Adjust trousers.postinst check for tcsd.conf mode (Closes: #1009630)
  * Remove "extra" priority (inherits "optional")
  * Revert the init script but use -e /dev/tpm0 over wildcard (Closes: #1009635)
  * d/rules: Remove useless override target
  * debhelper: Update to v13, getting rid of unnecessary build dependencies
  * 06-host_name_max.patch: Replace implementation-specific import with unistd.h
  * Consistently use $USER variable in init script (Closes: #808812)

 -- Bastian Germann <email address hidden> Wed, 13 Apr 2022 16:42:37 +0200

Source diff to previous version
1009630 /etc/tcsd.conf set to wrong owner in postinst
1009635 trousers init script fails with systemd if /dev/tpm* is absent
808812 trousers: initscript shouldn't hard code the username

Version: 0.3.15-0.1 2022-04-13 04:06:22 UTC

  trousers (0.3.15-0.1) unstable; urgency=medium

  * Non-maintainer upload
  * New upstream version (Closes: #1009370)
    - Fixes CVE-2020-24330, CVE-2020-24331, and CVE-2020-24332
  * d/copyright: Convert to machine-readable format (Closes: #1009372)
  * Fix install issue with init script (Closes: #895201)
  * Drop empty patch 08 and upstream patch 09

 -- Bastian Germann <email address hidden> Tue, 12 Apr 2022 19:21:33 +0200

1009370 trousers: Import new upstream version
1009372 trousers: Convert to machine-readable d/copyright
895201 trousers: syntax error in init script
CVE-2020-24330 An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop t
CVE-2020-24331 An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access
CVE-2020-24332 An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone



About   -   Send Feedback to @ubuntu_updates