bubblewrap 0.8.0-2 source package in Ubuntu

Changelog

bubblewrap (0.8.0-2) unstable; urgency=medium

  * Upload to unstable.
    The changes since 0.7.0 are small, and if a Flatpak vulnerability
    similar to CVE-2021-41133 is reported during the Debian 12 release
    lifetime, having the new --disable-userns option will give us more
    options for how to prevent it.

 -- Simon McVittie <email address hidden>  Tue, 28 Feb 2023 09:38:53 +0000

Upload details

Uploaded by:
Utopia Maintenance Team
Uploaded to:
Sid
Original maintainer:
Utopia Maintenance Team
Architectures:
linux-any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Mantic release main misc
Lunar release main misc

Downloads

File Size SHA-256 Checksum
bubblewrap_0.8.0-2.dsc 2.3 KiB a1e8a9b9e8b7ff91dc63cfc129d0080c0df77708c755953082ccebc4e7c88d8e
bubblewrap_0.8.0.orig.tar.xz 145.6 KiB 957ad1149db9033db88e988b12bcebe349a445e1efc8a9b59ad2939a113d333a
bubblewrap_0.8.0-2.debian.tar.xz 12.8 KiB 4acad6a916863f678bab8ab0778957fca56d55cd3b2db452ebf9e5f75cb19e16

Available diffs

No changes file available.

Binary packages built by this source

bubblewrap: utility for unprivileged chroot and namespace manipulation

 bubblewrap uses Linux namespaces to launch unprivileged containers.
 These containers can be used to sandbox semi-trusted applications such
 as Flatpak apps, image/video thumbnailers and web browser components,
 or to run programs in a different library stack such as a Flatpak runtime
 or a different Debian release.
 .
 By default, this package relies on a kernel with user namespaces enabled.
 Official Debian and Ubuntu kernels are suitable.
 .
 On kernels without user namespaces, system administrators can make the
 bwrap executable setuid root, allowing it to create unprivileged
 containers even though ordinary user processes cannot.

bubblewrap-dbgsym: debug symbols for bubblewrap