This bug was fixed in the package linux-meta-lts-xenial - 4.4.0.111.95 --------------- linux-meta-lts-xenial (4.4.0.111.95) trusty; urgency=medium
* Bump ABI 4.4.0-111 linux-meta-lts-xenial (4.4.0.110.94) trusty; urgency=medium * Bump ABI 4.4.0-110 * Miscellaneous upstream changes - Revert "UBUNTU: Make kernel image packages depend on cpu microcode updates" linux-meta-lts-xenial (4.4.0.109.93) trusty; urgency=medium * Make the kernel image packages depend on the cpu microcode updates, to ensure they are pulled into all host installs of Ubuntu on upgrade. LP: #1738259. -- Kleber Sacilotto de Souza <kleber.so...@canonical.com> Mon, 15 Jan 2018 16:22:12 +0100 ** Changed in: linux-meta-lts-xenial (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-meta in Ubuntu. https://bugs.launchpad.net/bugs/1738259 Title: need to ensure microcode updates are available to all bare-metal installs of Ubuntu Status in linux-meta package in Ubuntu: Triaged Status in linux-meta-hwe package in Ubuntu: New Status in linux-meta-hwe-edge package in Ubuntu: New Status in linux-meta-lts-xenial package in Ubuntu: Fix Released Status in linux-meta source package in Precise: New Status in linux-meta source package in Trusty: Fix Released Status in linux-meta source package in Xenial: Fix Released Status in linux-meta-hwe source package in Xenial: Fix Released Status in linux-meta-hwe-edge source package in Xenial: New Status in linux-meta-lts-xenial source package in Xenial: New Status in linux-meta source package in Zesty: New Status in linux-meta source package in Artful: Fix Released Status in linux-meta source package in Bionic: Triaged Bug description: From time to time, CPU vendors release updates to microcode that can be loaded into the CPU from the OS. For x86, we have these updates available in the archive as amd64-microcode and intel-microcode. Sometimes, these microcode updates have addressed security issues with the CPU. They almost certainly will again in the future. We should ensure that all users of Ubuntu on baremetal x86 receive these security updates, and have them applied to the CPU in early boot where at all feasible. Because these are hardware-dependent packages which we don't want to install except on baremetal (so: not in VMs or containers), the logical place to pull them into the system is via the kernel, so that only the kernel baremetal flavors pull them in. This is analogous to linux-firmware, which is already a dependency of the linux- image-{lowlatency,generic} metapackages, and whose contents are applied to the hardware by the kernel similar to microcode. So, please update the linux-image-{lowlatency,generic} metapackages to add a dependency on amd64-microcode [amd64], intel-microcode [amd64], and the corresponding hwe metapackages also. Please time this change to coincide with the next updates of the microcode packages in the archive. I believe we will also need to promote the *-microcode packages to main from restricted as part of this (again, by analogy with linux- firmware). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-meta/+bug/1738259/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp