[Summary]
MIR Team Ack to src:libbpf
This does not need a security review IMHO, but as outlined below I'd want
security to quickly ACK on that decision - assigning to Seth (security MIR
Team member) for that.
List of specific binary packages to be promoted to main: libbpf0

Required TODOs:
- None

Recommended TODOs:
- Add build and/or autopkgtest tests to the package to spot issues early

[Duplication]
There is no other package in main providing the same functionality.
Some packages that formerly had libbpf code slowly migrate to this lib.
But that isn't duplication it is the right thing to do.

[Dependencies]
OK:
- no other Dependencies to MIR due to this
- -dev package will be auto-promoted, but all it's deps are ok as well

[Embedded sources and static linking]
- no embedded source present (this is in fact used to un-embed some
  in other pkg)
- no static linking

[Security]
OK:
- history of CVEs does not look concerning
  No issues on the lib yet, but the kernel backend has some (as one would
  expect for such a dynamic interface)
  https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=bpf
- does not run a daemon as root
- does not use webkit1,2
- does not use lib*v8 directly
- does not open a port
- does not process arbitrary web content
- does not use centralized online accounts
- does not integrate arbitrary javascript into the desktop
- does not deal with system authentication (eg, pam), etc)

Problems:
- does not parse data formats, but no externally controlled ones

I'm unsure if this needs a security review. They are currently rather
busy with those and this package does replace code that was worse in iproute2
(pulling it into main). Since this is driven and in a lot of use by the
bigger kernel community as well as Debian jumping onto this for Buster I think
while I'd appreciate a review we don't strictly need it here as we are
replacing better code.
Also the new iproute needs to go along kernel 5.10 which just appeared in
21.04 so the runway is short.

But I'll want security to do a 5-10 minute read of that reasoning and the code
to agree to that decision. If they do we can go on promoting this immediately.
If security decides that a full review is needed it will go their way as usual.

[Common blockers]
OK:
- does not FTBFS currently
- The package has a team bug subscriber
- no translation present, but none needed for this case (user visible)?
- not a python/go package, no extra constraints to consider int hat regard
- no new python2 dependency

Problems:
- does not have a test suite that runs at build time
- does not have a test suite that runs as autopkgtest
Gladly that is somewhat covered by the upstream travis tests. None of the few
but growing dependencies has higher level tests yet. This isn't a blocker
since this is "just" the lib but certainly a step that would be recommended
to the owning team to add.


[Packaging red flags]
OK:
- Ubuntu does not carry a delta
- symbols tracking is in place
- d/watch is present and looks ok
- Upstream update history is good, but it is yet rather new
- Debian/Ubuntu update history is good
- the current release is packaged
- promoting this does not seem to cause issues for MOTUs that so far
  maintained the package
- no massive Lintian warnings
- d/rules is rather clean
- Does not have Built-Using

[Upstream red flags]
OK:
- no Errors/warnings during the build
- no incautious use of malloc/sprintf (as far as I can check it)
- no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH
- no use of user nobody
- no use of setuid
- no important open bugs (crashers, etc) in Debian or Ubuntu
- no dependency on webkit, qtwebkit, seed or libgoa-*
- not part of the UI for extra checks


** Changed in: libbpf (Ubuntu)
     Assignee: Christian Ehrhardt  (paelzer) => Seth Arnold (seth-arnold)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to iproute2 in Ubuntu.
Matching subscriptions: iproute2
https://bugs.launchpad.net/bugs/1910576

Title:
  [MIR] libbpf (dependency of iproute2)

Status in iproute2 package in Ubuntu:
  Invalid
Status in libbpf package in Ubuntu:
  New

Bug description:
  [Availability]
  libbpf | 0.1.0-1 | groovy/universe  | source
  libbpf | 0.3-2   | hirsute/universe | source

  [Rationale]
  Libbpf is (or is about to become) a dependency for building iproute2 which 
already is in main. Using BPF is becoming more wide-spread. The library allows 
to load and use eBPF programs from user-space (functionality provided by the 
kernel). It is already maintained in main for Debian 
(https://tracker.debian.org/pkg/libbpf)

  [Security]
  Since the code is taken out of the Linux kernel, this should be treated 
similar to the kernel for security. Research uncovered no records about 
security issues.

  [Quality assurance]
  At this point there are no open bug reports against libbpf (except this one) 
in Ubuntu. Also no open bugs found in Debian. Project is taken from the kernel 
source and claims static analysis via LGTM and Coverty. Also has CI via Travis 
(https://travis-ci.com/github/libbpf/libbpf).
  Right now there are no dep-8 tests. Though potentially it should be possible 
to create those, would this really add additional benefit beyond having 
upstream CI?
  A test build on hirsute was showing no warnings beyond lintian complaining 
about things which would be changed if we had delta (unstable as series for 
example). Otherwise was clean.

  [Dependencies]
  libc6: main
  libelf1: main
  zlib1g: main

  [Standards compliance]
  $ lintian --pedantic libbpf_0.3-2.dsc
  P: libbpf source: no-homepage-field
  P: libbpf source: silent-on-rules-requiring-root

  [Maintenance]
  As this is only taking out code from the kernel into a separate library 
package, the maintenance effort should be minimal. Packaging is done in Debian 
and is synced into Ubuntu (no delta).

  [Background information]
  A discourse about why this is packaged outside the kernel can be found at 
https://lwn.net/Articles/836911/.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iproute2/+bug/1910576/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to