Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libusbguard1 | Distribution: openSUSE Tumbleweed |
Version: 1.1.3 | Vendor: openSUSE |
Release: 1.4 | Build date: Thu Jun 6 20:02:42 2024 |
Group: System/Libraries | Build host: reproducible |
Size: 1112568 | Source RPM: usbguard-1.1.3-1.4.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://usbguard.github.io | |
Summary: Library for implementing USB device usage policy |
The USBGuard software framework helps to protect your computer against rogue USB devices by implementing basic whitelisting/blacklisting capabilities based on USB device attributes.
GPL-2.0-or-later
* Thu Jun 06 2024 Robert Frohl <[email protected]> - update to 1.1.3 * Fix typo in CLI --help message: "privilges" -> "privileges" * Harden service file: Set OOMScoreAdjust to -1000 * Specify what happens when neither RuleFile nor RuleFolder is set * The parent process should wait for the first child process to finish in forking mode(-f) * dbus: check whether the client wanted interactive authentication * Add missing .adoc files to the tarball * Replace problematic terms with alternatives * Fix CI by fixing calls to ldap-utils * Describe comments in the manual page * Store permanent rules even if RuleFile is not set but RuleFolder is. * Fix build for GCC 13 + make GitHub Actions cover build with GCC 13 * Bump GitHub Actions off deprecated actions/checkout@v2 * Actions(deps): Bump actions/checkout from 3.5.2 to 4.1.1 * Add "--version" option to the usbguard CLI * ruleset: detect integer overflow of the ID and bail out * Enable RuleFolder by default * Fix CI and RuleSet::assignID regressions - Removed build_gcc13.patch, included upstream * Tue Feb 20 2024 Dominique Leuenberger <[email protected]> - Use %autosetup macro. Allows to eliminate the usage of deprecated %patchN * Tue Mar 28 2023 Robert Frohl <[email protected]> - Fix build failure with gcc13, add build_gcc13.patch. * Mon Sep 05 2022 Robert Frohl <[email protected]> - update to 1.1.2 * Fixed - Polkit: Always allow getParameter/listDevices/listRules in active sessions - D-Bus: Send reply on auth failure - Polkit: Unreference PolkitAuthorizationResult and PolkitAuthority structs if needed * Tue Apr 05 2022 Dominique Leuenberger <[email protected]> - When running autoreconf, do it complete so that it does not trip over different versions of libtool being used. * Wed Mar 16 2022 Robert Frohl <[email protected]> - update to 1.1.1 * Fixed/Changed - Use authentication instead of authentification - Restore support for access control filenames without a group * Tue Mar 01 2022 Robert Frohl <[email protected]> - Enable dbus support (bsc#1196621, jsc#PED-3824). * Fri Feb 25 2022 Robert Frohl <[email protected]> - Fix build for Leap and SLE by using newer gcc version * Thu Feb 24 2022 Robert Frohl <[email protected]> - update to 1.1.0 * Added - Started building with C++17 - Tree-like list-devices output - Added CAP_AUDIT_WRITE capability to service file - Added support for lower OpenSSL versions prior to 1.1.0 - Added a new signal: DevicePolicyApplied * Fixed/Changed - Moved PIDFile from /var/run to /run - Fixed linker isssues with disable-static - Enhanced bash-completion script - Make username/group checking consistent with useradd manual page definition (with addition of capital letters) - Fixed multiple IPC related bugs - Fixed race condition when accessing port/connect_type for USB devices - Using bundled catch v2.13.8 - Using bundled PEGTL v3.2.5 - Fixed usbguard-rule-parser file opening - CVE-2019-25058: Fix unauthorized access via D-Bus (boo#1196460) - remove usbguard.service.in.patch applied upstream * Thu Aug 05 2021 Robert Frohl <[email protected]> - move usbguard.pid from /var/run to /run added usbguard.service.in.patch * Wed Jan 13 2021 Robert Frohl <[email protected]> - update to 1.0.0 * Added openssl support * Starting with libtool versioning * Added interface for IPC permission query * Introduced partial rule concept fo CLI * Added WithConnectType for ldap rule * Daemon does not apply the policy when "change" action event appears anymore * IPCClientPrivate@disconnect is thread safe * Enforced loading of files from .d/ direcory in alfabetical order * Improved CLI behaviour to be consistent * Clarified rule's label documentation
/usr/lib64/libusbguard.so.1 /usr/lib64/libusbguard.so.1.0.1 /usr/share/licenses/libusbguard1 /usr/share/licenses/libusbguard1/LICENSE
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Dec 12 00:13:13 2024