Not yet subscribing the MIR Team until the FTBFS is fixed and it was
clarified why it was demoted since the former MIR.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to zeromq3 in Ubuntu.
https://bugs.launchpad.net/bugs/1820232

Title:
  [MIR] zeromq3 as dependency of mailman3

Status in zeromq3 package in Ubuntu:
  New

Bug description:
  [Availability]
  zeromq3 exists in Universe already. Current version in disco is 4.2.5-2 and it
  builds in amd64, arm64, armhf, i386, ppc64el, s390x.

  It produces two binary packages: a library runtime, and its corresponding
  development package. We need the runtime libzmq5 in main.

  Disco proposed has had 4.3.1-3 for 45 days and it hasn't migrated because it's
  failing to build due to a failing test:
  """
  FAIL: tests/test_filter_ipc
  ===========================

  test_filter_ipc: tests/testutil.hpp:142: void bounce(void*, void*): Assertion 
`rc == 32' failed.
  FAIL tests/test_filter_ipc (exit status: 134)

  That failure does not happen locally, but repeats itself in Launchpad after a
  rebuild.
  """

  [Rationale]
  This is part of the MIR activity for all dependencies of mailman3
  The "main" MIR of it is at bug 1775427:

  Mailman (2) has only python2 support, but we strive for python3,
  therefore Mailman3 which has python3 support should be promoted to main.

  Please do note that there were former MIRs in:
  - bug 1597436
  - bug 1597439
  The latter being accepted.
  It seems to have been demoted since then, we need to check why but hopefully 
this easens the re-promotion.

  [Security]
  CVE history:
  - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6250
    A pointer overflow, with code execution, was discovered in ZeroMQ libzmq 
(aka
    0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp
    zmq::v2_decoder_t::size_ready integer overflow allows an authenticated 
attacker
    to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, 
which
    can be leveraged to run arbitrary code on the target system. The memory 
layout
    allows the attacker to inject OS commands into a data structure located
    immediately after the problematic buffer (i.e., it is not necessary to use a
    typical buffer-overflow exploitation technique that changes the flow of
    control).
  - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938
    The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in
    print-zeromq.c:zmtp1_print_frame().
  - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7203
    libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are
    unique, which allows man-in-the-middle attackers to conduct replay attacks 
via
    unspecified vectors.
  - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7202
    stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows
    man-in-the-middle attackers to conduct downgrade attacks via a crafted
    connection request.

  Ubuntu CVE tracker at
  http://people.ubuntu.com/~ubuntu-security/cve/universe.html:
  - lists https://people.canonical.com/~ubuntu-security/cve/CVE-2019-6250 as
    still open in disco
  - debian: https://security-tracker.debian.org/tracker/CVE-2019-6250
  - upstream (patch and exploit): https://github.com/zeromq/libzmq/issues/3351


  [Quality assurance]

  As part of the mailman3 stacks as of now (Disco) this installs fine and works 
fine.
  On itself it is useful to (many) other dependencies and does not need a post 
install configuration on its own.

  No debconf questions asked, it's just a library package.

  It's currently stuck in disco-proposed migration due to a build (test,
  actually) failure:
  
http://people.canonical.com/~ubuntu-archive/proposed-migration/update_excuses.html#zeromq3

  Ubuntu bugs:
  - one open bug from 2016: 
https://bugs.launchpad.net/ubuntu/+source/zeromq3/+bug/1602900
    libzmq3 crashes when 'getifaddrs()' is unavailable
    Fixed upstream in 4.2.0, which leaves only xenial and older without a fix.
  - remaining open CVE in disco (see previous section)

  Debian bugs: 
https://bugs.debian.org/cgi-bin/pkgreport.cgi?repeatmerged=no&src=zeromq3
  - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814346
    libzmq5: Wrong dependency?
  - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896711
    zeromq3: please package curve_keygen utility
  - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743508
    libzmq3: upgrading from 3.2.3 to 4.0.4 breaks python-pytango

  Upstream issues: https://github.com/zeromq/libzmq/issues
  - 138 open, >1k closed
  - self-labeled critical bugs (6): 
https://github.com/zeromq/libzmq/labels/Critical
    - half from 2018, the rest is older

  Upstream has CI:
  - https://travis-ci.org/zeromq/libzmq (currently failing)
  - https://ci.appveyor.com/project/zeromq/libzmq (currently failing)
  - https://coveralls.io/github/zeromq/libzmq?branch=master (coverage at 81%)

  Debian PTS: https://tracker.debian.org/pkg/zeromq3
  - seems to get frequent uploads

  Misc observations
  - building 4.3.1-3 locally (where the tests pass) shows that new symbols are
    being introduced in this update, but not reflected in the symbols file.
    - http://paste.ubuntu.com/p/HYGDwJfv5g/ search for gensymbols
  - active development community
    - dev mailing list: https://lists.zeromq.org/pipermail/zeromq-dev/
    - frequent commits: https://github.com/zeromq/libzmq/commits/master
  - mismatched majors between dev and runtime library packages:
    - libzmq3-dev
    - libzmq5

  No exotic hardware involved in this package.

  Tests
  - no DEP8 tests
  - test suite run at package build time, with a "nocheck" check in
    DEB_BUILD_OPTIONS
  - failure in the test suite actually fails the build, as can be seen in the
    failed migration in disco-proposed

  The package includes a working debian/watch file.

  Lintian
  Full output: https://pastebin.ubuntu.com/p/bFS3FSYPqv/
  I'd highlight:
  - d/copyright needs updating (wildcard-matches-nothing-in-dep5-copyright)
  - testsuite-autopkgtest-missing
  - hardening-no-bindnow
  - symbols file probably will need updating (if the package migrates away from
    disco-proposed)

  No reliance on obsolete or orphaned packages.

  [UI standards]
  N/A, since this is a library.

  [Dependencies]

  Some dependencies are not in main, but we drive MIR for all related packages
  that are not in main at the same time.
  Please check the list of bugs from the main Mailman3 MIR in bug 1775427 to 
get an overview.

  [Standards compliance]
  No FHS violations.

  d/control declares somewhat current standards version 4.3.0

  Just found the mismatch between dev and runtime major versions in the package
  name a bit odd.

  Source package is trivial to maintain, d/rules uses debheloer and is easy to
  understand

  [Maintenance]

  The Server team will subscribe for the package for maintenance

  [Background]
  None at this time.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zeromq3/+bug/1820232/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to