[Summary] MIR Team Ack no security evaluation needed. Notes: - It was stated that tests on cloud instance types happened, it would be nice to hear if this will be done continuously in some place (e.g. on image publish)? - Is there any chance this conflicts with normal use cases like alice&bobs laptops. If so should we add conflicts to avoid that?
[Duplication] It is a vehicle to get intel-microcode and amd64-microcode loaded and going in cases they are not yet. This means that this is only a hook to get it processed - all the heavy lifting eventually is done by the microcode packages themselves. There is no other package in main providing the same functionality (under the special conditions this targets). The VCS links point to non existing https://salsa.debian.org/debian/microcode-initrd and copyright mentioned 2012-2016 Henrique de Moraes Holschuh, so there might ne same/similar code in Debian in other places? He is the maintainer of the two depended -microcode packages. This then becomes clear on the comment "based on intel-microcode & amd64-microcode initramfs-tools hooks". Ok in that case the functionality really isn't present already for the corner case this tries to cover. [Dependencies] OK: - no other Dependencies to MIR due to this (intel-microcode, amd64-microcode) - no -dev/-debug/-doc packages that need exclusion [Embedded sources and static linking] OK: - no embedded source present - no static linking [Security] OK: - history of CVEs does not look concerning - does not run a daemon as root - does not use webkit1,2 - does not use lib*v8 directly - does not parse data formats - does not open a port - does not process arbitrary web content - does not use centralized online accounts - does not integrate arbitrary javascript into the desktop - does not deal with system authentication (eg, pam), etc) It doesn't have enough history for CVEs but it is essentially an apply-vehicle for the microcode. There are other such means for already common setups, this just adds a new vector to apply the microcode. So the CVEs and such would be on those microcode packages already (and they are fine for now). [Common blockers] OK: - does not FTBFS currently - The package has a team bug subscriber (Foundations is already subscribed) - no translation present, but none needed for this case (user visible)? - not a python/go package, no extra constraints to consider int hat regard - no new python2 dependency Problems: - does have a test suite that runs at build time - test suite fails will fail the build upon error. - does have a test suite that runs as autopkgtest => This will be tested as part of the image delivery to azure and already stated to be tested that way - this won't be boot or autopkgtest testable anyway I guess. [Packaging red flags] OK: - Ubuntu does not carry a delta - symbols tracking not applicable for this kind of code. - d/watch is present and looks ok - Upstream update history is irrelevant (we are upstream) - Ubuntu update history is yet unknown - the current release is packaged - promoting this does not seem to cause issues for MOTUs that so far maintained the package - no massive Lintian warnings - d/rules is rather clean - Does not have Built-Using [Upstream red flags] OK: - no Errors/warnings during the build - no incautious use of malloc/sprintf - no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH - no use of user nobody - no use of setuid - no important open bugs (crashers, etc) in Debian or Ubuntu - no dependency on webkit, qtwebkit, seed or libgoa-* - no embedded source copies - not part of the UI for extra checks ** Changed in: microcode-initrd (Ubuntu) Status: New => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-meta-aws in Ubuntu. https://bugs.launchpad.net/bugs/1895200 Title: [MIR] microcode-initrd Status in linux-meta-aws package in Ubuntu: Opinion Status in microcode-initrd package in Ubuntu: In Progress Bug description: [Availability] * Groovy Universe [Rationale] * Needed to apply microcode updates, on bare-metal public-cloud machines, that otherwise boot without a full initrd. [Security] * This package is tiny, just a single small shell script trigger hook that create microcode-initrd from intel-microcode and amd-microcode packages. [Quality assurance] * Installing this package automatically integrates with grub2 thus this package needs no configuration to start using. * There are no debconf questions * Package is new, unique to Ubuntu [Dependencies] * All dependencies are in main [Standards compliance] * Complies with policy [Maintenance] * Foundations-bugs subscribed [Background information] * Currently we have a few public-clouds with bare-metal instance types that boot without initrd. To apply microcode updates as required to mitigate Spectre, Meldown, MDS attacks, a microcode-only initrd needs to be loaded by grub, as late-loading of microcode is not safe. This package was tested successfully on multiple instance types to ensure correct operation. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-meta-aws/+bug/1895200/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

