firejail 0.9.70-1ubuntu1 source package in Ubuntu

Changelog

firejail (0.9.70-1ubuntu1) kinetic; urgency=medium

  * Merge with Debian unstable. (LP: #1979358)
    Remaining changes:
    - When running autopkgtests, do not attempt to install firefox on
      architectures where it isn't built any longer (LP #1965314)
      - debian/tests/control

firejail (0.9.70-1) unstable; urgency=medium

  * New upstream release.
    - fix sound playback in chromium (Closes: #1003650)
  * Drop patches applied upstream.
  * Enable new IDS feature during build.
  * Mark nvm.profile as removed.
  * Extend lintian-override match to include profstats.
  * Move profiles tests back from smoke- to simple-tests, as they
    are too environment dependent.
  * Add procps to test dependencies.

firejail (0.9.68-4) unstable; urgency=high

  * Fix local root exploit reachable via --join logic. (CVE-2022-31214)
    (Closes: #1012510)

firejail (0.9.68-3) unstable; urgency=medium

  * Fix hyperrogue profile, which causes autopkgtest failure in Ubuntu CI.

firejail (0.9.68-2) unstable; urgency=medium

  * Add file to test dependencies.

firejail (0.9.68-1) unstable; urgency=medium

  * New upstream release.
  * Remove hostnames conffile, which has been renamed and moved to libdir.
  * Add a superficial autopkgtest that should run stable, but can
    catch breakage.

firejail (0.9.68~rc1-1) experimental; urgency=medium

  * New upstream release candidate.
    - fix telegram-desktop profile (Closes: #1002998)
    - allow webext directory in chromium profile (Closes: #1003234)
    - blacklist rxvt when perl is blacklisted (Closes: #1003259)
    - don't reject empty arguments (LP: #1934698)
  * Rename lintian tag in override: setuid-binary -> elevated-privileges.
  * Add lintian overrides for non-standard-executable-perm and
    executable-in-usr-lib.
  * Install new .config files.
  * Remove conffile: disable-passwdmgr.inc.
  * Document new copyright.
  * Bump Standards-Version to 4.6.0.
  * Bump copyright years to 2022.

 -- Paride Legovini <email address hidden>  Wed, 22 Jun 2022 19:53:11 +0200

Upload details

Uploaded by:
Paride Legovini
Uploaded to:
Kinetic
Original maintainer:
Ubuntu Developers
Architectures:
linux-any all
Section:
misc
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
firejail_0.9.70.orig.tar.xz 473.7 KiB b77b67a4db7c01d69cb033a50aa7b1132dfaeb2cd97ce6412285235265b71b17
firejail_0.9.70.orig.tar.xz.asc 488 bytes 145461097f6efcacba3f6a97f15de3f2e4da05cdf419ccd95af3f4ef26c1aa20
firejail_0.9.70-1ubuntu1.debian.tar.xz 15.6 KiB c80990e51b9c18cfb807b3d6772e1a6ffd2e5f457b146eddd1af77718f853ddd
firejail_0.9.70-1ubuntu1.dsc 2.2 KiB 92772ec68488443b22e04b1261066706a13b76e33dc9d217c850bc9032fb1d64

View changes file

Binary packages built by this source

firejail: sandbox to restrict the application environment

 Firejail is a SUID security sandbox program that reduces the risk of
 security breaches by restricting the running environment of untrusted
 applications using Linux namespaces and seccomp-bpf. It allows a
 process and all its descendants to have their own private view of the
 globally shared kernel resources, such as the network stack, process
 table, mount table.

firejail-dbgsym: No summary available for firejail-dbgsym in ubuntu kinetic.

No description available for firejail-dbgsym in ubuntu kinetic.

firejail-profiles: profiles for the firejail application sandbox

 Firejail is a SUID security sandbox program that reduces the risk of
 security breaches by restricting the running environment of untrusted
 applications using Linux namespaces and seccomp-bpf. It allows a
 process and all its descendants to have their own private view of the
 globally shared kernel resources, such as the network stack, process
 table, mount table.
 .
 This package contains firejail profiles for various applications.