Source: libcap-ng
Version: 0.7.9-2.2
Severity: wishlist

Dear maintainer,

there are some new upstream releases available at
<http://people.redhat.com/sgrubb/libcap-ng/>, the ChangeLog reads as
follows:

| 0.8.2
| - In capng_apply, if we blew up in bounding set, allow setting capabilities
| - If PR_CAP_AMBIENT is not available, do not build libdrop_ambient
| - Improve last_cap check
| 
| 0.8.1
| - If procfs is not available, leave last_cap as CAP_LAST_CAP
| - If bounding and ambient not found in status, try prctl method
| - In capng_apply, move ambient caps to the end of the transaction
| - In capng_apply, return errors more aggressively.
| - In capng_apply, if the action includes the bounding set,resync with the 
kernel
| - Fix signed/unsigned warning in cap-ng.c
| - In capng_apply, return a unique error code to diagnose any failure
| - In capng_have_capability, return 0 for failure
| - Add the libdrop_ambient admin tool
| 
| 0.8
| - Add vararg support to python bindings for capng_updatev
| - Add support for ambient capabilities
| - Add support for V3 filesystem capabilities
| 
| 0.7.11
| - Really clear bounding set if asked in capng_change_id
| - Add CAP_PERFMON, CAP_BPF, & CAP_CHECKPOINT_RESTORE
| - Avoid malloc/free in capng_apply (Natanael Copa)
| - If procfs is not available, get bounding set via prctl
| - Cleanup some compiler warnings
| 
| 0.7.10
| - Update capng_change_id man page
| - Add capng_have_permitted_capabilities function
| - Update filecap to output which set the capabilities are in
| - Fix filecap to not output an error when a file has no capabilities
| - Add udplite support to netcap
| - Fix usage of pthread_atfork (Joe Orton)
| - Mark processes in child user namespaces with * (Danila Kiver)

Please update the package when you think it is due time.

Cheers,
Flo

Attachment: signature.asc
Description: PGP signature

Reply via email to