bubblewrap 0.7.0-2 source package in Ubuntu

Changelog

bubblewrap (0.7.0-2) unstable; urgency=medium

  * d/p/test-run-Filter-out-no-new-privs-in-capsh-output.patch:
    Add patch from upstream to fix test failure with newer capsh
  * Update standards version to 4.6.2 (no changes needed)
  * Remove version constraints unnecessary since buster (oldstable)

 -- Simon McVittie <email address hidden>  Wed, 11 Jan 2023 18:30:16 +0000

Upload details

Uploaded by:
Utopia Maintenance Team
Uploaded to:
Sid
Original maintainer:
Utopia Maintenance Team
Architectures:
linux-any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
bubblewrap_0.7.0-2.dsc 2.3 KiB cb41b71f1a8c0351a0b1c32285a3ac250c5e946f3a64a4d817d48e10471921f8
bubblewrap_0.7.0.orig.tar.xz 144.2 KiB 764ab7100bd037ea53d440d362e099d7a425966bc62d1f00ab26b8fbb882a9dc
bubblewrap_0.7.0-2.debian.tar.xz 12.5 KiB 35a6c158cacb2d380d5696db1b3c19f4a3d0b78879f6f660fff080a065750c76

Available diffs

No changes file available.

Binary packages built by this source

bubblewrap: utility for unprivileged chroot and namespace manipulation

 bubblewrap uses Linux namespaces to launch unprivileged containers.
 These containers can be used to sandbox semi-trusted applications such
 as Flatpak apps, image/video thumbnailers and web browser components,
 or to run programs in a different library stack such as a Flatpak runtime
 or a different Debian release.
 .
 By default, this package relies on a kernel with user namespaces enabled.
 Official Debian and Ubuntu kernels are suitable.
 .
 On kernels without user namespaces, system administrators can make the
 bwrap executable setuid root, allowing it to create unprivileged
 containers even though ordinary user processes cannot.

bubblewrap-dbgsym: debug symbols for bubblewrap