Core execution tool for unprivileged containers
https://github.com/projectatomic/bubblewrap
Bubblewrap (%{_bindir}/bwrap) is a core execution engine for unprivileged
containers that works as a setuid binary on kernels without
user namespaces.
- Devel package for openSUSE:Factory
-
6
derived packages
- Links to openSUSE:Factory / bubblewrap
- Has a link diff
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout Virtualization:containers/bubblewrap && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_link | 0000000124 124 Bytes | |
bubblewrap-0.10.0.tar.xz | 0000119328 117 KB | |
bubblewrap.changes | 0000021118 20.6 KB | |
bubblewrap.spec | 0000002414 2.36 KB |
Revision 37 (latest revision is 43)
Sebastian Wagner (sebix)
accepted
request 1193981
from
Bjørn Lie (iznogood)
(revision 37)
- Update to version v0.10.0: * New features: Add the --[ro-]bind-fd option, which can be used to mount a filesystem represented by a file descriptor without time-of-check/time-of-use attacks. This is needed when resolving CVE-2024-42472 in Flatpak. * Other changes: Fix some confusing syntax in SetupOpFlag (no functional change).
Comments 0