[MIR] libseccomp
Bug #1082431 reported by
Stéphane Graber
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
libseccomp (Ubuntu) |
Fix Released
|
Undecided
|
Jamie Strandboge |
Bug Description
Please promote libseccomp to main.
This library is used to control the new seccomp feature of recent linux kernels and is a build and runtime dependency of lxc (see bug 509647).
It has no out-of-main build-dependencies and now install time dependencies outside of the libc.
This package currently has no bug on Launchpad and only low priority/wishlist bug on the Debian PTS.
Ubuntu doesn't carry any delta on the package and the Debian maintainer is pretty reactive (Kees Cook).
Changed in libseccomp (Ubuntu): | |
assignee: | nobody → Jamie Strandboge (jdstrand) |
Changed in libseccomp (Ubuntu): | |
assignee: | Stéphane Graber (stgraber) → Jamie Strandboge (jdstrand) |
status: | In Progress → New |
To post a comment you must log in.
* Does it FTBFS currently? builds fine with only main enabled
* Does it have a test suite? yes, but it is disabled in the build
* Does Ubuntu carry a delta? yes, but only to adjust it to build on i386 and amd64
* it has a symbols file
* Does it have a bug subscriber in Ubuntu? no
* Does it have a watch file? yes
* Is its update history slow or sporadic? slow
* Is the current release packaged? no. Upstream indicates "Change the API to be context-aware; eliminates all internal state but breaks compatibility with the previous 0.1.0 release"
* Will entering main make it harder for the people currently keeping it up to date? possibly-- the driver for this MIR is LXC and one of the two main LXC maintainers in Ubuntu is not core-dev (the other is)
* Lintian warnings: clean
* Is debian/rules a mess? no, it's fine
* Errors/warnings during the build: no
* Incautious use of malloc/sprintf: no (malloc calls are all properly checked)
* Uses of sudo or LD_LIBRARY_PATH: no
* Important bugs (crashers, etc) in Debian or Ubuntu: no. mostly around documentation
* Does the package have a CVE history? no
* An in depth security audit is not warranted at this time
While I'd like to see this promoted to main and seeded on its own to promote its use (as opposed to just because lxc wants it), there is some work that is still needed. Conditional ACK if the following are met:
* the test suite is enabled in the build
* ensure the Ubuntu delta is upstreamed to Debian
* a bug subscriber is added
* the package is updated to 1.0.1 (and submitted to Debian)