libseccomp 2.5.4-1ubuntu2 source package in Ubuntu

Changelog

libseccomp (2.5.4-1ubuntu2) lunar; urgency=medium

  * No-change rebuild with Python 3.11 as supported

 -- Graham Inggs <email address hidden>  Wed, 02 Nov 2022 10:24:36 +0000

Upload details

Uploaded by:
Graham Inggs
Uploaded to:
Lunar
Original maintainer:
Ubuntu Developers
Architectures:
linux-any
Section:
libs
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
libseccomp_2.5.4.orig.tar.gz 622.3 KiB d82902400405cf0068574ef3dc1fe5f5926207543ba1ae6f8e7a1576351dcbdb
libseccomp_2.5.4.orig.tar.gz.asc 833 bytes af37e70eb422e6f983c1f135a3abb342c3b787716520b71bd774e4906003807f
libseccomp_2.5.4-1ubuntu2.debian.tar.xz 23.1 KiB 6e3daf2da5f07530437474662d73e5247333fbac1e12f6eebb9cdec9b65fcc0a
libseccomp_2.5.4-1ubuntu2.dsc 2.7 KiB dd95c5455a4c82dde8bd5440354d4bcf29fa95c7012bf24b725f56ff8e271c3a

Available diffs

View changes file

Binary packages built by this source

libseccomp-dev: high level interface to Linux seccomp filter (development files)

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.
 .
 This package contains the development files.

libseccomp2: high level interface to Linux seccomp filter

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.

libseccomp2-dbgsym: debug symbols for libseccomp2
python3-seccomp: high level interface to Linux seccomp filter (Python 3 bindings)

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.

python3-seccomp-dbgsym: debug symbols for python3-seccomp
seccomp: helper tools for high level interface to Linux seccomp filter

 Provides helper tools for interacting with libseccomp. Currently, only
 a single tool exists, providing a way to easily enumerate syscalls across
 the supported architectures.

seccomp-dbgsym: debug symbols for seccomp