Package bubblewrap: Information

    Source package: bubblewrap
    Version: 0.5.0-alt2
    Build time:  Dec 6, 2021, 07:15 PM in the task #290513
    Category: System/Base
    Report package bug
    License: LGPLv2+
    Summary: Unprivileged sandboxing tool
    Description: 
    Many container runtime tools like systemd-nspawn, docker, etc. focus on providing
    infrastructure for system administrators and orchestration tools (e.g. Kubernetes) to run containers.
    
    These tools are not suitable to give to unprivileged users,
    because it is trivial to turn such access into to a fully privileged root shell on the host.

    List of rpms provided by this srpm:
    bubblewrap (x86_64, ppc64le, i586, armh, aarch64)
    bubblewrap-debuginfo (x86_64, ppc64le, i586, armh, aarch64)

    Maintainer: Vitaly Lipatov


      1. libselinux-devel
      2. libelf-devel
      3. binutils-devel
      4. docbook-style-xsl
      5. db2latex-xsl
      6. gcc-c++
      7. libcap-devel
      8. xsltproc

    Last changed


    Nov. 23, 2021 Yuri N. Sedunov 0.5.0-alt2
    - disabled user namespaces in a setuid mode (ALT #41418)
    Oct. 11, 2021 Yuri N. Sedunov 0.5.0-alt1
    - 0.5.0
    May 20, 2020 Ivan Razzhivin 0.4.1-alt2
    - fix run path (Closes: 38163)