Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: usbguard | Distribution: openSUSE Tumbleweed |
Version: 1.1.3 | Vendor: openSUSE |
Release: 1.3 | Build date: Thu Jun 6 20:02:42 2024 |
Group: System/Daemons | Build host: reproducible |
Size: 349784 | Source RPM: usbguard-1.1.3-1.3.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://usbguard.github.io | |
Summary: A tool for implementing USB device usage policy |
The USBGuard software framework helps to protect your computer against rogue USB devices by implementing basic whitelisting/blacklisting capabilities based on USB device attributes.
GPL-2.0-or-later
* Thu Jun 06 2024 Robert Frohl <rfrohl@suse.com> - update to 1.1.3 * Fix typo in CLI --help message: "privilges" -> "privileges" * Harden service file: Set OOMScoreAdjust to -1000 * Specify what happens when neither RuleFile nor RuleFolder is set * The parent process should wait for the first child process to finish in forking mode(-f) * dbus: check whether the client wanted interactive authentication * Add missing .adoc files to the tarball * Replace problematic terms with alternatives * Fix CI by fixing calls to ldap-utils * Describe comments in the manual page * Store permanent rules even if RuleFile is not set but RuleFolder is. * Fix build for GCC 13 + make GitHub Actions cover build with GCC 13 * Bump GitHub Actions off deprecated actions/checkout@v2 * Actions(deps): Bump actions/checkout from 3.5.2 to 4.1.1 * Add "--version" option to the usbguard CLI * ruleset: detect integer overflow of the ID and bail out * Enable RuleFolder by default * Fix CI and RuleSet::assignID regressions - Removed build_gcc13.patch, included upstream * Tue Feb 20 2024 Dominique Leuenberger <dimstar@opensuse.org> - Use %autosetup macro. Allows to eliminate the usage of deprecated %patchN * Tue Mar 28 2023 Robert Frohl <rfrohl@suse.com> - Fix build failure with gcc13, add build_gcc13.patch. * Mon Sep 05 2022 Robert Frohl <rfrohl@suse.com> - update to 1.1.2 * Fixed - Polkit: Always allow getParameter/listDevices/listRules in active sessions - D-Bus: Send reply on auth failure - Polkit: Unreference PolkitAuthorizationResult and PolkitAuthority structs if needed * Tue Apr 05 2022 Dominique Leuenberger <dimstar@opensuse.org> - When running autoreconf, do it complete so that it does not trip over different versions of libtool being used. * Wed Mar 16 2022 Robert Frohl <rfrohl@suse.com> - update to 1.1.1 * Fixed/Changed - Use authentication instead of authentification - Restore support for access control filenames without a group * Tue Mar 01 2022 Robert Frohl <rfrohl@suse.com> - Enable dbus support (bsc#1196621, jsc#PED-3824). * Fri Feb 25 2022 Robert Frohl <rfrohl@suse.com> - Fix build for Leap and SLE by using newer gcc version * Thu Feb 24 2022 Robert Frohl <rfrohl@suse.com> - update to 1.1.0 * Added - Started building with C++17 - Tree-like list-devices output - Added CAP_AUDIT_WRITE capability to service file - Added support for lower OpenSSL versions prior to 1.1.0 - Added a new signal: DevicePolicyApplied * Fixed/Changed - Moved PIDFile from /var/run to /run - Fixed linker isssues with disable-static - Enhanced bash-completion script - Make username/group checking consistent with useradd manual page definition (with addition of capital letters) - Fixed multiple IPC related bugs - Fixed race condition when accessing port/connect_type for USB devices - Using bundled catch v2.13.8 - Using bundled PEGTL v3.2.5 - Fixed usbguard-rule-parser file opening - CVE-2019-25058: Fix unauthorized access via D-Bus (boo#1196460) - remove usbguard.service.in.patch applied upstream * Thu Aug 05 2021 Robert Frohl <rfrohl@suse.com> - move usbguard.pid from /var/run to /run added usbguard.service.in.patch * Wed Jan 13 2021 Robert Frohl <rfrohl@suse.com> - update to 1.0.0 * Added openssl support * Starting with libtool versioning * Added interface for IPC permission query * Introduced partial rule concept fo CLI * Added WithConnectType for ldap rule * Daemon does not apply the policy when "change" action event appears anymore * IPCClientPrivate@disconnect is thread safe * Enforced loading of files from .d/ direcory in alfabetical order * Improved CLI behaviour to be consistent * Clarified rule's label documentation
/etc/usbguard /etc/usbguard/IPCAccessControl.d /etc/usbguard/rules.conf /etc/usbguard/usbguard-daemon.conf /usr/lib/systemd/system/usbguard-dbus.service /usr/lib/systemd/system/usbguard.service /usr/sbin/rcusbguard /usr/sbin/usbguard-daemon /usr/sbin/usbguard-dbus /usr/share/bash-completion/completions/usbguard /usr/share/dbus-1/system-services/org.usbguard1.service /usr/share/dbus-1/system.d/org.usbguard1.conf /usr/share/doc/packages/usbguard /usr/share/doc/packages/usbguard/CHANGELOG.md /usr/share/doc/packages/usbguard/README.adoc /usr/share/licenses/usbguard /usr/share/licenses/usbguard/LICENSE /usr/share/man/man5/usbguard-daemon.conf.5.gz /usr/share/man/man5/usbguard-rules.conf.5.gz /usr/share/man/man8/usbguard-daemon.8.gz /usr/share/man/man8/usbguard-dbus.8.gz /usr/share/polkit-1/actions/org.usbguard1.policy /usr/share/zsh /usr/share/zsh/site-functions /usr/share/zsh/site-functions/_usbguard /var/log/usbguard
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Nov 14 00:43:26 2024