[ubuntu/trusty-proposed] libseccomp 2.1.1-1ubuntu1~trusty1 (Accepted)
Tyler Hicks
tyhicks at canonical.com
Tue Dec 20 18:47:32 UTC 2016
libseccomp (2.1.1-1ubuntu1~trusty1) trusty-proposed; urgency=medium
* Bring libseccomp 2.1.1-1ubuntu1~vivid2, from Ubuntu 14.10, to Ubuntu
14.04 and add a couple patches to account for new syscalls found in the
4.4 based hardware enablement kernel. This allows for proper snap seccomp
confinement on Ubuntu 14.04 when using the hardware enablement kernel
(LP: #1450642)
- debian/patches/add-membarrier-and-userfaultfd.patch: Add membarrier and
userfaultfd syscalls
- debian/patches/add-mlock2.patch: Add mlock2 syscall
- debian/tests/data/all-except-s390-4.4.filter: Add autopkgtest that
verifies all syscalls found in the 4.4 kernel, except for the s390
specific syscalls, are supported by libseccomp. The s390 specific
syscalls are not needed since this version of libseccomp does not
support the s390 architecture.
- debian/tests/test-filter: Skip the getrandom filter tests since
SYS_getrandom is not defined in 14.04 environment and the getrandom(2)
syscall is not even available in the 14.04 release kernel.
Date: Thu, 15 Dec 2016 23:26:30 +0000
Changed-By: Tyler Hicks <tyhicks at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/libseccomp/2.1.1-1ubuntu1~trusty1
-------------- next part --------------
Format: 1.8
Date: Thu, 15 Dec 2016 23:26:30 +0000
Source: libseccomp
Binary: libseccomp-dev libseccomp2 seccomp
Architecture: source
Version: 2.1.1-1ubuntu1~trusty1
Distribution: trusty-proposed
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Tyler Hicks <tyhicks at canonical.com>
Description:
libseccomp-dev - high level interface to Linux seccomp filter (development files)
libseccomp2 - high level interface to Linux seccomp filter
seccomp - helper tools for high level interface to Linux seccomp filter
Launchpad-Bugs-Fixed: 1450642
Changes:
libseccomp (2.1.1-1ubuntu1~trusty1) trusty-proposed; urgency=medium
.
* Bring libseccomp 2.1.1-1ubuntu1~vivid2, from Ubuntu 14.10, to Ubuntu
14.04 and add a couple patches to account for new syscalls found in the
4.4 based hardware enablement kernel. This allows for proper snap seccomp
confinement on Ubuntu 14.04 when using the hardware enablement kernel
(LP: #1450642)
- debian/patches/add-membarrier-and-userfaultfd.patch: Add membarrier and
userfaultfd syscalls
- debian/patches/add-mlock2.patch: Add mlock2 syscall
- debian/tests/data/all-except-s390-4.4.filter: Add autopkgtest that
verifies all syscalls found in the 4.4 kernel, except for the s390
specific syscalls, are supported by libseccomp. The s390 specific
syscalls are not needed since this version of libseccomp does not
support the s390 architecture.
- debian/tests/test-filter: Skip the getrandom filter tests since
SYS_getrandom is not defined in 14.04 environment and the getrandom(2)
syscall is not even available in the 14.04 release kernel.
Checksums-Sha1:
cf21c2cbf49ece058263699e1a0beb44d3ea7d82 2002 libseccomp_2.1.1-1ubuntu1~trusty1.dsc
e208821194d69865c36cf352152227425a71de7c 21289 libseccomp_2.1.1-1ubuntu1~trusty1.debian.tar.gz
Checksums-Sha256:
92c4cf34883fc690892473dd23a124be195a3a41fd410def6653a9de00c69f8c 2002 libseccomp_2.1.1-1ubuntu1~trusty1.dsc
4e740ed1e0f5bee54544d510b3f281ad7743af55d3522837cfedca861090163b 21289 libseccomp_2.1.1-1ubuntu1~trusty1.debian.tar.gz
Files:
b4083329210131b0b7d6ed082d318bc8 2002 libs optional libseccomp_2.1.1-1ubuntu1~trusty1.dsc
0be88b2cd10a72990f81b61111bf9956 21289 libs optional libseccomp_2.1.1-1ubuntu1~trusty1.debian.tar.gz
Original-Maintainer: Kees Cook <kees at debian.org>
More information about the Trusty-changes
mailing list