2015-04-22 18:13:03 |
Jason Gerard DeRose |
bug |
|
|
added bug |
2015-04-22 18:13:03 |
Jason Gerard DeRose |
attachment added |
|
IMG_7979_01.jpg https://bugs.launchpad.net/bugs/1447282/+attachment/4381692/+files/IMG_7979_01.jpg |
|
2015-04-22 18:23:59 |
Jason Gerard DeRose |
summary |
Prompted for cryptoswap passphrase when using GPT partitioning + encrypted home directory (ecrptfs) |
Prompted for cryptoswap passphrase when using GPT partitioning + encrypted home directory (ecryptfs) |
|
2015-04-22 19:12:39 |
Nobuto Murata |
bug |
|
|
added subscriber Nobuto Murata |
2015-04-23 21:30:37 |
Jason Gerard DeRose |
attachment added |
|
generator.late.tgz https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1447282/+attachment/4382428/+files/generator.late.tgz |
|
2015-04-23 21:31:12 |
Jason Gerard DeRose |
attachment added |
|
generator.tgz https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1447282/+attachment/4382430/+files/generator.tgz |
|
2015-04-24 08:58:53 |
Martin Pitt |
nominated for series |
|
Ubuntu Vivid |
|
2015-04-24 08:58:53 |
Martin Pitt |
bug task added |
|
systemd (Ubuntu Vivid) |
|
2015-04-24 08:59:08 |
Martin Pitt |
systemd (Ubuntu Vivid): importance |
Undecided |
High |
|
2015-04-24 08:59:08 |
Martin Pitt |
systemd (Ubuntu Vivid): status |
New |
In Progress |
|
2015-04-24 08:59:08 |
Martin Pitt |
systemd (Ubuntu Vivid): assignee |
|
Martin Pitt (pitti) |
|
2015-04-24 08:59:46 |
Martin Pitt |
summary |
Prompted for cryptoswap passphrase when using GPT partitioning + encrypted home directory (ecryptfs) |
Does not use encrypted swap when using GPT partitioning + encrypted home directory (ecryptfs) |
|
2015-04-24 09:08:13 |
Martin Pitt |
affects |
systemd (Ubuntu Vivid) |
ecryptfs-utils (Ubuntu Vivid) |
|
2015-04-24 11:02:34 |
Martin Pitt |
bug task added |
|
ecryptfs-utils |
|
2015-04-24 11:12:57 |
Martin Pitt |
description |
I'm still sorting out the details and eliminating variables, but as far as I can tell:
Steps to reproduce
===============
1) Install Ubuntu using GPT partitioning for the OS drive[*]
2) Choose "require my password to login", and check "encrypt my home directory"
Expected behavior
===============
No special user interaction should be required to initialized the crytposwap other than normally logging in
Actual behavior
============
Prior to lightdm coming up, you will be prompted to enter your passphrase to unlock the cryptoswap, similar to how you would be prompted to unlock the OS drive when using full disk encryption (see attached photo).
When lightdm comes up, you have to enter your password/passphrase again to login.
Work-arounds
===========
1) This only seems to happen when using GTP partitioning, not MBR... so use MBR if you can
2) Even with GTP partitioning, booting with init=/sbin/upstart seems to reliably fix the problem, so it certainly seems systemd related
Notes
=====
* As far as I can tell, there isn't a way to force Ubiquity to create a GPT partition table when the OS drive is < 2TB, but it will automatically use GPT partitioning when the OS drive is >= 2TB. My particular test was done using the System76 imaging server, which by default uses GPT partitioning even when the OS drive is < 2TB.
ProblemType: Bug
DistroRelease: Ubuntu 15.04
Package: systemd 219-7ubuntu3
ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3
Uname: Linux 3.19.0-15-generic x86_64
ApportVersion: 2.17.2-0ubuntu1
Architecture: amd64
CurrentDesktop: Unity
Date: Wed Apr 22 11:40:29 2015
EcryptfsInUse: Yes
MachineType: System76, Inc. Kudu Professional
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic root=UUID=e6c5aea5-d57c-410d-abce-66e96175e946 ro quiet splash vt.handoff=7
SourcePackage: systemd
UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 01/15/2014
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 1.03.03RS76
dmi.board.asset.tag: Tag 12345
dmi.board.name: Kudu Professional
dmi.board.vendor: System76, Inc.
dmi.board.version: kudp1
dmi.chassis.asset.tag: No Asset Tag
dmi.chassis.type: 9
dmi.chassis.vendor: System76, Inc.
dmi.chassis.version: kudp1
dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1.03.03RS76:bd01/15/2014:svnSystem76,Inc.:pnKuduProfessional:pvrkudp1:rvnSystem76,Inc.:rnKuduProfessional:rvrkudp1:cvnSystem76,Inc.:ct9:cvrkudp1:
dmi.product.name: Kudu Professional
dmi.product.version: kudp1
dmi.sys.vendor: System76, Inc. |
I'm still sorting out the details and eliminating variables, but as far as I can tell:
Steps to reproduce
===============
1) Install Ubuntu using GPT partitioning for the OS drive[*]
2) Choose "require my password to login", and check "encrypt my home directory"
Expected behavior
===============
No special user interaction should be required to initialized the crytposwap other than normally logging in
Actual behavior
============
Prior to lightdm coming up, you will be prompted to enter your passphrase to unlock the cryptoswap, similar to how you would be prompted to unlock the OS drive when using full disk encryption (see attached photo).
When lightdm comes up, you have to enter your password/passphrase again to login.
Work-arounds
===========
1) This only seems to happen when using GTP partitioning, not MBR... so use MBR if you can
2) Even with GTP partitioning, booting with init=/sbin/upstart seems to reliably fix the problem, so it certainly seems systemd related
Notes
=====
* As far as I can tell, there isn't a way to force Ubiquity to create a GPT partition table when the OS drive is < 2TB, but it will automatically use GPT partitioning when the OS drive is >= 2TB. My particular test was done using the System76 imaging server, which by default uses GPT partitioning even when the OS drive is < 2TB.
SRU INFORMATION
================
Regression potential:
This is delicate as we need to fix existing installations with a post-install script. This needs to happen as defensively as possible, but errors in this can still potentially completely break your partition information. Apart from testing that in the above scenario the unencrypted swap partition is marked as "no-auto" and thus after a new boot you are actually using the cryptswap1 one, we also need to verify that it does not destroy working systems.
Test case:
(1) Install an EFI system with "encrypt my home directory" (You can do this in QEMU with -bios OVMF.fd); after booting the first time you will be asked to enter a passprase for the swap partition, just press enter. "sudo swapon -s" will say something like /dev/sda3, i. e. using unencrypted swap. After installing this update and rebooting, the bogus passphrase prompt on boot should be gone, and "sudo swapon -s" should say /dev/dm-0, i. e. using encrypted swap.
In all these other cases the update should not do anything and booting continues to work:
(2) In the above system, "sudo apt-get install --reinstall ecryptfs-utils" should not change partitions again, but say something like "is already marked as no-auto".
(3) Install an EFI system without home dir encryption
(4) Install an MBR system with home dir encryption
(5) Install an MBR system without home dir encryption
ProblemType: Bug
DistroRelease: Ubuntu 15.04
Package: systemd 219-7ubuntu3
ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3
Uname: Linux 3.19.0-15-generic x86_64
ApportVersion: 2.17.2-0ubuntu1
Architecture: amd64
CurrentDesktop: Unity
Date: Wed Apr 22 11:40:29 2015
EcryptfsInUse: Yes
MachineType: System76, Inc. Kudu Professional
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic root=UUID=e6c5aea5-d57c-410d-abce-66e96175e946 ro quiet splash vt.handoff=7
SourcePackage: systemd
UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 01/15/2014
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 1.03.03RS76
dmi.board.asset.tag: Tag 12345
dmi.board.name: Kudu Professional
dmi.board.vendor: System76, Inc.
dmi.board.version: kudp1
dmi.chassis.asset.tag: No Asset Tag
dmi.chassis.type: 9
dmi.chassis.vendor: System76, Inc.
dmi.chassis.version: kudp1
dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1.03.03RS76:bd01/15/2014:svnSystem76,Inc.:pnKuduProfessional:pvrkudp1:rvnSystem76,Inc.:rnKuduProfessional:rvrkudp1:cvnSystem76,Inc.:ct9:cvrkudp1:
dmi.product.name: Kudu Professional
dmi.product.version: kudp1
dmi.sys.vendor: System76, Inc. |
|
2015-04-24 13:01:38 |
Martin Pitt |
attachment added |
|
vivid debdiff https://bugs.launchpad.net/ecryptfs-utils/+bug/1447282/+attachment/4382977/+files/ecryptfs.debdiff |
|
2015-04-24 16:19:59 |
Ubuntu Foundations Team Bug Bot |
tags |
amd64 apport-bug ecryptfs systemd-boot vivid |
amd64 apport-bug ecryptfs patch systemd-boot vivid |
|
2015-04-26 19:00:05 |
Gaele Strootman |
bug |
|
|
added subscriber Gaele Strootman |
2015-04-28 05:18:06 |
Martin Pitt |
attachment added |
|
vivid debdiff https://bugs.launchpad.net/ecryptfs-utils/+bug/1447282/+attachment/4386259/+files/ecryptfs-utils_107-0ubuntu1_107-0ubuntu1.1.diff |
|
2015-04-28 05:18:15 |
Martin Pitt |
attachment removed |
vivid debdiff https://bugs.launchpad.net/ecryptfs-utils/+bug/1447282/+attachment/4382977/+files/ecryptfs.debdiff |
|
|
2015-04-28 14:23:35 |
Martin Pitt |
ecryptfs-utils (Ubuntu Vivid): status |
In Progress |
Fix Committed |
|
2015-04-29 14:01:44 |
Chris J Arges |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2015-04-29 14:01:49 |
Chris J Arges |
bug |
|
|
added subscriber SRU Verification |
2015-04-29 14:01:53 |
Chris J Arges |
tags |
amd64 apport-bug ecryptfs patch systemd-boot vivid |
amd64 apport-bug ecryptfs patch systemd-boot verification-needed vivid |
|
2015-04-29 19:20:37 |
Jason Gerard DeRose |
attachment added |
|
Screenshot from 2015-04-29 13_05_13.png https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282/+attachment/4387774/+files/Screenshot%20from%202015-04-29%2013_05_13.png |
|
2015-04-29 20:39:42 |
Jason Gerard DeRose |
tags |
amd64 apport-bug ecryptfs patch systemd-boot verification-needed vivid |
amd64 apport-bug ecryptfs patch systemd-boot verification-done vivid |
|
2015-04-30 06:07:26 |
Denny |
bug |
|
|
added subscriber Denny Klessens |
2015-05-03 15:10:13 |
junomedia |
bug |
|
|
added subscriber dapmk |
2015-05-04 10:42:56 |
Sebastian |
bug |
|
|
added subscriber Sebastian |
2015-05-04 17:51:28 |
Steve Langasek |
tags |
amd64 apport-bug ecryptfs patch systemd-boot verification-done vivid |
amd64 apport-bug ecryptfs patch systemd-boot verification-failed vivid |
|
2015-05-04 17:51:35 |
Steve Langasek |
bug |
|
|
added subscriber Steve Langasek |
2015-05-05 05:14:36 |
Martin Pitt |
tags |
amd64 apport-bug ecryptfs patch systemd-boot verification-failed vivid |
amd64 apport-bug ecryptfs patch systemd-boot verification-done vivid |
|
2015-05-05 07:20:02 |
Alistair Grant |
bug |
|
|
added subscriber Alistair Grant |
2015-05-06 14:45:48 |
Allen McBride |
bug |
|
|
added subscriber Allen McBride |
2015-05-06 18:04:58 |
Launchpad Janitor |
ecryptfs-utils (Ubuntu Vivid): status |
Fix Committed |
Fix Released |
|
2015-05-06 18:05:03 |
Scott Kitterman |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2015-05-07 13:46:15 |
Launchpad Janitor |
ecryptfs-utils (Ubuntu): status |
Fix Committed |
Fix Released |
|
2015-05-08 05:30:29 |
JunYang Pink |
attachment added |
|
error-msg.png https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282/+attachment/4393368/+files/error-msg.png |
|
2015-05-17 19:25:53 |
Xavier Guillot |
bug |
|
|
added subscriber Xavier Guillot |
2015-05-22 20:23:59 |
David Bonner |
bug task added |
|
systemd (Ubuntu) |
|
2015-05-23 07:31:07 |
Launchpad Janitor |
systemd (Ubuntu): status |
New |
Confirmed |
|
2015-05-23 07:31:07 |
Launchpad Janitor |
systemd (Ubuntu Vivid): status |
New |
Confirmed |
|
2015-05-23 14:28:09 |
Martin Pitt |
bug task deleted |
systemd (Ubuntu Vivid) |
|
|
2015-05-23 14:28:11 |
Martin Pitt |
bug task deleted |
systemd (Ubuntu) |
|
|
2015-05-24 14:23:49 |
Launchpad Janitor |
branch linked |
|
lp:ubuntu/ecryptfs-utils |
|
2015-05-26 17:07:28 |
Bruno Munoz |
bug |
|
|
added subscriber Bruno Munoz |
2015-05-26 17:21:55 |
Bruno Munoz |
removed subscriber Bruno Munoz |
|
|
|
2015-06-08 14:17:22 |
Erik Zimmerman |
bug |
|
|
added subscriber Erik Zimmerman |
2015-06-18 12:17:31 |
Tilman Keskinöz |
bug |
|
|
added subscriber Tilman Keskinöz |
2015-07-23 08:37:30 |
Martin Beukman |
bug |
|
|
added subscriber Martin Beukman |
2015-08-03 08:19:40 |
Sven Behrend |
bug |
|
|
added subscriber Sven Behrend |
2015-08-04 15:51:30 |
Dustin Kirkland |
ecryptfs-utils: importance |
Undecided |
High |
|
2015-08-04 17:59:51 |
Dustin Kirkland |
affects |
ecryptfs-utils |
ecryptfs |
|
2015-08-04 17:59:51 |
Dustin Kirkland |
ecryptfs: status |
New |
Confirmed |
|
2015-08-04 18:00:10 |
Dustin Kirkland |
ecryptfs: status |
Confirmed |
Fix Committed |
|
2015-08-04 18:00:14 |
Dustin Kirkland |
ecryptfs: assignee |
|
Dustin Kirkland (kirkland) |
|
2015-12-04 14:58:24 |
Stefan Hamcke |
bug |
|
|
added subscriber Stefan Hamcke |
2016-03-29 23:09:34 |
Dirk Thomas |
bug |
|
|
added subscriber Dirk Thomas |
2016-03-30 21:57:02 |
david6 |
bug |
|
|
added subscriber david6 |
2016-04-23 07:33:54 |
Martin Pitt |
nominated for series |
|
Ubuntu Yakkety |
|
2016-04-23 07:33:54 |
Martin Pitt |
bug task added |
|
ecryptfs-utils (Ubuntu Yakkety) |
|
2016-04-23 07:33:54 |
Martin Pitt |
nominated for series |
|
Ubuntu Xenial |
|
2016-04-23 07:33:54 |
Martin Pitt |
bug task added |
|
ecryptfs-utils (Ubuntu Xenial) |
|
2016-04-23 07:34:07 |
Martin Pitt |
ecryptfs-utils (Ubuntu Yakkety): status |
Fix Released |
In Progress |
|
2016-04-23 07:34:14 |
Martin Pitt |
ecryptfs-utils (Ubuntu Xenial): status |
New |
In Progress |
|
2016-04-24 08:24:17 |
Tony Baines |
bug |
|
|
added subscriber Tony Baines |
2016-05-01 07:59:55 |
grosso |
bug |
|
|
added subscriber grosso |
2016-05-02 17:00:43 |
Mathew Hodson |
ecryptfs-utils (Ubuntu Xenial): importance |
Undecided |
High |
|
2016-05-12 12:19:27 |
Martin Pitt |
ecryptfs-utils (Ubuntu Xenial): status |
In Progress |
Triaged |
|
2016-05-12 12:19:29 |
Martin Pitt |
ecryptfs-utils (Ubuntu Yakkety): status |
In Progress |
Triaged |
|
2016-06-19 11:43:58 |
Donald Pellegrino |
bug |
|
|
added subscriber Donald Pellegrino |
2016-07-01 20:22:04 |
Chris Rainey |
bug |
|
|
added subscriber Chris Rainey |
2016-07-04 12:46:27 |
Rocko |
bug |
|
|
added subscriber Rocko |
2016-07-08 21:32:48 |
Launchpad Janitor |
branch linked |
|
lp:~tyhicks/ecryptfs/lp1597154-packaging |
|
2016-07-13 05:03:41 |
Launchpad Janitor |
branch linked |
|
lp:ecryptfs |
|
2016-07-14 10:06:06 |
Martin Pitt |
ecryptfs-utils (Ubuntu Yakkety): assignee |
Martin Pitt (pitti) |
Tyler Hicks (tyhicks) |
|
2016-07-14 14:52:59 |
Launchpad Janitor |
ecryptfs-utils (Ubuntu Xenial): status |
Triaged |
Fix Released |
|
2016-07-14 14:56:38 |
Tyler Hicks |
description |
I'm still sorting out the details and eliminating variables, but as far as I can tell:
Steps to reproduce
===============
1) Install Ubuntu using GPT partitioning for the OS drive[*]
2) Choose "require my password to login", and check "encrypt my home directory"
Expected behavior
===============
No special user interaction should be required to initialized the crytposwap other than normally logging in
Actual behavior
============
Prior to lightdm coming up, you will be prompted to enter your passphrase to unlock the cryptoswap, similar to how you would be prompted to unlock the OS drive when using full disk encryption (see attached photo).
When lightdm comes up, you have to enter your password/passphrase again to login.
Work-arounds
===========
1) This only seems to happen when using GTP partitioning, not MBR... so use MBR if you can
2) Even with GTP partitioning, booting with init=/sbin/upstart seems to reliably fix the problem, so it certainly seems systemd related
Notes
=====
* As far as I can tell, there isn't a way to force Ubiquity to create a GPT partition table when the OS drive is < 2TB, but it will automatically use GPT partitioning when the OS drive is >= 2TB. My particular test was done using the System76 imaging server, which by default uses GPT partitioning even when the OS drive is < 2TB.
SRU INFORMATION
================
Regression potential:
This is delicate as we need to fix existing installations with a post-install script. This needs to happen as defensively as possible, but errors in this can still potentially completely break your partition information. Apart from testing that in the above scenario the unencrypted swap partition is marked as "no-auto" and thus after a new boot you are actually using the cryptswap1 one, we also need to verify that it does not destroy working systems.
Test case:
(1) Install an EFI system with "encrypt my home directory" (You can do this in QEMU with -bios OVMF.fd); after booting the first time you will be asked to enter a passprase for the swap partition, just press enter. "sudo swapon -s" will say something like /dev/sda3, i. e. using unencrypted swap. After installing this update and rebooting, the bogus passphrase prompt on boot should be gone, and "sudo swapon -s" should say /dev/dm-0, i. e. using encrypted swap.
In all these other cases the update should not do anything and booting continues to work:
(2) In the above system, "sudo apt-get install --reinstall ecryptfs-utils" should not change partitions again, but say something like "is already marked as no-auto".
(3) Install an EFI system without home dir encryption
(4) Install an MBR system with home dir encryption
(5) Install an MBR system without home dir encryption
ProblemType: Bug
DistroRelease: Ubuntu 15.04
Package: systemd 219-7ubuntu3
ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3
Uname: Linux 3.19.0-15-generic x86_64
ApportVersion: 2.17.2-0ubuntu1
Architecture: amd64
CurrentDesktop: Unity
Date: Wed Apr 22 11:40:29 2015
EcryptfsInUse: Yes
MachineType: System76, Inc. Kudu Professional
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic root=UUID=e6c5aea5-d57c-410d-abce-66e96175e946 ro quiet splash vt.handoff=7
SourcePackage: systemd
UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 01/15/2014
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 1.03.03RS76
dmi.board.asset.tag: Tag 12345
dmi.board.name: Kudu Professional
dmi.board.vendor: System76, Inc.
dmi.board.version: kudp1
dmi.chassis.asset.tag: No Asset Tag
dmi.chassis.type: 9
dmi.chassis.vendor: System76, Inc.
dmi.chassis.version: kudp1
dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1.03.03RS76:bd01/15/2014:svnSystem76,Inc.:pnKuduProfessional:pvrkudp1:rvnSystem76,Inc.:rnKuduProfessional:rvrkudp1:cvnSystem76,Inc.:ct9:cvrkudp1:
dmi.product.name: Kudu Professional
dmi.product.version: kudp1
dmi.sys.vendor: System76, Inc. |
CVE Request: http://openwall.com/lists/oss-security/2016/07/13/2
I'm still sorting out the details and eliminating variables, but as far as I can tell:
Steps to reproduce
===============
1) Install Ubuntu using GPT partitioning for the OS drive[*]
2) Choose "require my password to login", and check "encrypt my home directory"
Expected behavior
===============
No special user interaction should be required to initialized the crytposwap other than normally logging in
Actual behavior
============
Prior to lightdm coming up, you will be prompted to enter your passphrase to unlock the cryptoswap, similar to how you would be prompted to unlock the OS drive when using full disk encryption (see attached photo).
When lightdm comes up, you have to enter your password/passphrase again to login.
Work-arounds
===========
1) This only seems to happen when using GTP partitioning, not MBR... so use MBR if you can
2) Even with GTP partitioning, booting with init=/sbin/upstart seems to reliably fix the problem, so it certainly seems systemd related
Notes
=====
* As far as I can tell, there isn't a way to force Ubiquity to create a GPT partition table when the OS drive is < 2TB, but it will automatically use GPT partitioning when the OS drive is >= 2TB. My particular test was done using the System76 imaging server, which by default uses GPT partitioning even when the OS drive is < 2TB.
SRU INFORMATION
================
Regression potential:
This is delicate as we need to fix existing installations with a post-install script. This needs to happen as defensively as possible, but errors in this can still potentially completely break your partition information. Apart from testing that in the above scenario the unencrypted swap partition is marked as "no-auto" and thus after a new boot you are actually using the cryptswap1 one, we also need to verify that it does not destroy working systems.
Test case:
(1) Install an EFI system with "encrypt my home directory" (You can do this in QEMU with -bios OVMF.fd); after booting the first time you will be asked to enter a passprase for the swap partition, just press enter. "sudo swapon -s" will say something like /dev/sda3, i. e. using unencrypted swap. After installing this update and rebooting, the bogus passphrase prompt on boot should be gone, and "sudo swapon -s" should say /dev/dm-0, i. e. using encrypted swap.
In all these other cases the update should not do anything and booting continues to work:
(2) In the above system, "sudo apt-get install --reinstall ecryptfs-utils" should not change partitions again, but say something like "is already marked as no-auto".
(3) Install an EFI system without home dir encryption
(4) Install an MBR system with home dir encryption
(5) Install an MBR system without home dir encryption
ProblemType: Bug
DistroRelease: Ubuntu 15.04
Package: systemd 219-7ubuntu3
ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3
Uname: Linux 3.19.0-15-generic x86_64
ApportVersion: 2.17.2-0ubuntu1
Architecture: amd64
CurrentDesktop: Unity
Date: Wed Apr 22 11:40:29 2015
EcryptfsInUse: Yes
MachineType: System76, Inc. Kudu Professional
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic root=UUID=e6c5aea5-d57c-410d-abce-66e96175e946 ro quiet splash vt.handoff=7
SourcePackage: systemd
UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 01/15/2014
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 1.03.03RS76
dmi.board.asset.tag: Tag 12345
dmi.board.name: Kudu Professional
dmi.board.vendor: System76, Inc.
dmi.board.version: kudp1
dmi.chassis.asset.tag: No Asset Tag
dmi.chassis.type: 9
dmi.chassis.vendor: System76, Inc.
dmi.chassis.version: kudp1
dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1.03.03RS76:bd01/15/2014:svnSystem76,Inc.:pnKuduProfessional:pvrkudp1:rvnSystem76,Inc.:rnKuduProfessional:rvrkudp1:cvnSystem76,Inc.:ct9:cvrkudp1:
dmi.product.name: Kudu Professional
dmi.product.version: kudp1
dmi.sys.vendor: System76, Inc. |
|
2016-07-15 01:59:31 |
Launchpad Janitor |
ecryptfs-utils (Ubuntu Yakkety): status |
Triaged |
Fix Released |
|
2016-07-15 01:59:31 |
Launchpad Janitor |
cve linked |
|
2016-6224 |
|
2016-08-06 02:14:20 |
Micheal Hill |
bug |
|
|
added subscriber Micheal Hill |
2016-10-29 05:44:15 |
wolf |
bug |
|
|
added subscriber wolf |
2016-11-18 16:54:39 |
Béné |
bug |
|
|
added subscriber Béné |
2017-01-17 23:38:21 |
Check |
bug |
|
|
added subscriber Check |
2017-05-01 17:16:16 |
Michael |
bug |
|
|
added subscriber Michael |