This is a special case, as we have the newer versions already in main in Bionic. Therefore the evaluation checks if the older version has CVEs, packaging issues and such - but is no full re-evaluation.
[Duplication] No duplication, it is one of the more common python backends for cryptography. [Embedded sources and static linking] - no embedded sources - no static linking - no golang [Security] This is one of the biggest parts of the re-check as we need to ensure that the older version has no known or unmaintainable deficiencies But it seems fine - no existing CVEs associated. It still is security sensitive, as it's purpose is to handle tokens that entitle users of a given feature. Therefore I'd want an ack by the ubuntu-security team - which given it is a re-review should go fast as well. [Common blockers] - builds fine in Xenial last time, I asked for a rebuild to prove that also trusty will be fine - Testsuite is running and blocking build on Xenial as well as on newer versions - the server team is already subscribed to the package - no user visible output that needs translation - only python3 dependencies are used (but then for Xenial/Trusty this wouldn't even be important) - dh_python is in use [Packaging red flags] - no Ubuntu delta? - a symbols file is tracking ABI on build - debian/watch present - updates were ok so far (it isn't moving too fast thou) - no massive Lintian warnings - very clean d/rules (almost only dh @) [Upstream red flags] - no build errors on the Xenial version that will be added to main - no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH - one older bug, but nothing serious or affecting the MIR - no dependency on webkit, qtwebkit, seed or libgoa-* [Summary] As expected - since the newer versions are already in main - this wasn't too critical. After comparing the differences of the version in main in bionic to what shall be promited in Xenial/Trusty there were no blockers identified. TODOs: @Chad - since this wasn't built a long time in Xenial and never before in Trusty. Could you please provide a PPA that builds the set of three packages in both Releases? @Security - this package does cryptography, so IMHO security ack is needed. The reason for that is that the version in main is libsodium23 at 1.0.16-2 or higher but for Xenial/Trusty it will be libsodium18 at 1.0.8-5 (as in Xenial). I'll do the assign on the bug tasks. ** Changed in: libsodium (Ubuntu Trusty) Assignee: Christian Ehrhardt (paelzer) => Ubuntu Security Team (ubuntu-security) ** Changed in: libsodium (Ubuntu Xenial) Assignee: Christian Ehrhardt (paelzer) => Ubuntu Security Team (ubuntu-security) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1621386 Title: [MIR] libsodium To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libsodium/+bug/1621386/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs