bubblewrap 0.9.0-1build1 source package in Ubuntu

Changelog

bubblewrap (0.9.0-1build1) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- Steve Langasek <email address hidden>  Sun, 31 Mar 2024 08:43:28 +0000

Upload details

Uploaded by:
Steve Langasek
Uploaded to:
Noble
Original maintainer:
Ubuntu Developers
Architectures:
linux-any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release main misc
Noble release main misc

Downloads

File Size SHA-256 Checksum
bubblewrap_0.9.0.orig.tar.xz 116.2 KiB c6347eaced49ac0141996f46bba3b089e5e6ea4408bc1c43bab9f2d05dd094e1
bubblewrap_0.9.0.orig.tar.xz.asc 833 bytes 355568011016d6d5592c13830778a9b06365926f6478ae43e51b2ab5c3bc3c92
bubblewrap_0.9.0-1build1.debian.tar.xz 12.5 KiB 8e816b99de42172e8eb2b9db36a4b411e698573d98dfa3bee8129ee370f365dc
bubblewrap_0.9.0-1build1.dsc 2.6 KiB 7bd2a45d8aff9e89515486773ef356d9f8c56ea655c315dceb76fb5acef06477

View changes file

Binary packages built by this source

bubblewrap: utility for unprivileged chroot and namespace manipulation

 bubblewrap uses Linux namespaces to launch unprivileged containers.
 These containers can be used to sandbox semi-trusted applications such
 as Flatpak apps, image/video thumbnailers and web browser components,
 or to run programs in a different library stack such as a Flatpak runtime
 or a different Debian release.
 .
 By default, this package relies on a kernel with user namespaces enabled.
 Official Debian and Ubuntu kernels are suitable.
 .
 On kernels without user namespaces, system administrators can make the
 bwrap executable setuid root, allowing it to create unprivileged
 containers even though ordinary user processes cannot.

bubblewrap-dbgsym: debug symbols for bubblewrap