Package bubblewrap: Information
Source package: bubblewrap
Version: 0.5.0-alt2
Build time: Dec 6, 2021, 07:15 PM in the task #290513
Category: System/Base
Report package bugHome page: https://github.com/projectatomic/bubblewrap
License: LGPLv2+
Summary: Unprivileged sandboxing tool
Description:
Many container runtime tools like systemd-nspawn, docker, etc. focus on providing infrastructure for system administrators and orchestration tools (e.g. Kubernetes) to run containers. These tools are not suitable to give to unprivileged users, because it is trivial to turn such access into to a fully privileged root shell on the host.
List of rpms provided by this srpm:
bubblewrap (x86_64, ppc64le, i586, armh, aarch64)
bubblewrap-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
bubblewrap (x86_64, ppc64le, i586, armh, aarch64)
bubblewrap-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
Maintainer: Vitaly Lipatov
Last changed
Nov. 23, 2021 Yuri N. Sedunov 0.5.0-alt2
- disabled user namespaces in a setuid mode (ALT #41418)
Oct. 11, 2021 Yuri N. Sedunov 0.5.0-alt1
- 0.5.0
May 20, 2020 Ivan Razzhivin 0.4.1-alt2
- fix run path (Closes: 38163)