2020-01-18 19:35:58 |
Claudio Matsuoka |
bug |
|
|
added bug |
2020-01-18 19:35:58 |
Claudio Matsuoka |
attachment added |
|
Kernel backtrace https://bugs.launchpad.net/bugs/1860231/+attachment/5321425/+files/trace.txt |
|
2020-01-18 19:37:29 |
Claudio Matsuoka |
attachment added |
|
Screenshot of the procedure to trigger the crash https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860231/+attachment/5321426/+files/Screenshot%20from%202020-01-18%2016-16-19.png |
|
2020-01-18 19:50:49 |
Claudio Matsuoka |
bug |
|
|
added subscriber Michael Vogt |
2020-01-18 20:00:08 |
Ubuntu Kernel Bot |
linux (Ubuntu): status |
New |
Incomplete |
|
2020-01-18 20:07:34 |
Claudio Matsuoka |
attachment added |
|
Model file used to build the image https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860231/+attachment/5321427/+files/ubuntu-core-20-amd64.model |
|
2020-01-20 09:22:10 |
Michael Vogt |
bug |
|
|
added subscriber Chris Coulson |
2020-01-20 09:29:00 |
Andrea Righi |
linux (Ubuntu): assignee |
|
Andrea Righi (arighi) |
|
2020-01-20 10:08:43 |
Tyler Hicks |
bug |
|
|
added subscriber Tyler Hicks |
2020-01-20 14:34:43 |
Tyler Hicks |
description |
An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap.
Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020
Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8
How to reproduce the crash in 3 "easy" steps:
1. Build a Core 20 image using the attached model file:
1.1. Install the ubuntu-image from latest/edge
$ sudo snap install --channel latest/edge ubuntu-image
1.2. Build the image
$ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model
2. Boot the image in kvm
2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the
stock ovmf from bionic may not work)
2.2. Boot the image
$ sudo kvm -snapshot -m 2048 -smp 4 \
-netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \
-device virtio-net-pci,netdev=mynet0 \
-drive file=pc.img,if=virtio \
-bios /usr/share/OVMF/OVMF_CODE.ms.fd
2.3. In the grub menu, edit the default option to include parameter
"systemd.debug-shell=1" in the kernel command line
2.4. Boot the kernel
3. Crash the kernel
3.1. When the system boots to the "Press enter to configure"
message, press ALT-F9 to enter the debug shell.
3.2. The system should have two partitions in /dev/vda. Create a
third one with fdisk.
3.3. Create a LUKS encrypted partition:
# echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3
(the system will complain about a missing locking directory,
just ignore it.)
3.4. Open the encrypted device:
# echo 123|cryptsetup open --key-file - /dev/vda name
3.5. Read the crash message
The attached screenshots show these steps being executed.
A few notes:
- The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here.
- In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system).
- All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example). |
An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap.
Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020
Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8
How to reproduce the crash in 3 "easy" steps:
1. Build a Core 20 image using the attached model file:
1.1. Install the ubuntu-image from latest/edge
$ sudo snap install --channel latest/edge ubuntu-image
1.2. Build the image
$ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model
2. Boot the image in kvm
2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the
stock ovmf from bionic may not work)
2.2. Boot the image
$ sudo kvm -snapshot -m 2048 -smp 4 \
-netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \
-device virtio-net-pci,netdev=mynet0 \
-drive file=pc.img,if=virtio \
-bios /usr/share/OVMF/OVMF_CODE.ms.fd
2.3. In the grub menu, edit the default option to include parameter
"systemd.debug-shell=1" in the kernel command line
2.4. Boot the kernel
3. Crash the kernel
3.1. When the system boots to the "Press enter to configure"
message, press ALT-F9 to enter the debug shell.
3.2. The system should have two partitions in /dev/vda. Create a
third one with fdisk.
3.3. Create a LUKS encrypted partition:
# echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3
(the system will complain about a missing locking directory,
just ignore it.)
3.4. Open the encrypted device:
# echo 123|cryptsetup open --key-file - /dev/vda name
The Core 20 images contain the following udev rule which causes
the new block device to be mounted automatically. This mount is
what triggers the BUG:
ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \
RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"
3.5. Read the crash message
The attached screenshots show these steps being executed.
A few notes:
- The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here.
- In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system).
- All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example). |
|
2020-01-21 14:26:27 |
Michael Vogt |
attachment added |
|
snapd_1337.2.43.1_amd64.deb https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860231/+attachment/5321900/+files/snapd_1337.2.43.1_amd64.deb |
|
2020-01-22 11:51:17 |
Stefan Bader |
bug |
|
|
added subscriber Stefan Bader |
2020-01-22 14:46:45 |
Stefan Bader |
linux (Ubuntu): status |
Incomplete |
Triaged |
|
2020-01-22 14:46:53 |
Stefan Bader |
linux (Ubuntu): importance |
Undecided |
High |
|
2020-01-22 14:47:19 |
Stefan Bader |
nominated for series |
|
Ubuntu Xenial |
|
2020-01-22 14:47:19 |
Stefan Bader |
bug task added |
|
linux (Ubuntu Xenial) |
|
2020-01-22 14:47:19 |
Stefan Bader |
nominated for series |
|
Ubuntu Eoan |
|
2020-01-22 14:47:19 |
Stefan Bader |
bug task added |
|
linux (Ubuntu Eoan) |
|
2020-01-22 14:47:19 |
Stefan Bader |
nominated for series |
|
Ubuntu Bionic |
|
2020-01-22 14:47:19 |
Stefan Bader |
bug task added |
|
linux (Ubuntu Bionic) |
|
2020-01-22 14:47:38 |
Stefan Bader |
nominated for series |
|
Ubuntu Disco |
|
2020-01-22 14:47:38 |
Stefan Bader |
bug task added |
|
linux (Ubuntu Disco) |
|
2020-01-22 14:48:41 |
Tyler Hicks |
description |
An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap.
Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020
Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8
How to reproduce the crash in 3 "easy" steps:
1. Build a Core 20 image using the attached model file:
1.1. Install the ubuntu-image from latest/edge
$ sudo snap install --channel latest/edge ubuntu-image
1.2. Build the image
$ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model
2. Boot the image in kvm
2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the
stock ovmf from bionic may not work)
2.2. Boot the image
$ sudo kvm -snapshot -m 2048 -smp 4 \
-netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \
-device virtio-net-pci,netdev=mynet0 \
-drive file=pc.img,if=virtio \
-bios /usr/share/OVMF/OVMF_CODE.ms.fd
2.3. In the grub menu, edit the default option to include parameter
"systemd.debug-shell=1" in the kernel command line
2.4. Boot the kernel
3. Crash the kernel
3.1. When the system boots to the "Press enter to configure"
message, press ALT-F9 to enter the debug shell.
3.2. The system should have two partitions in /dev/vda. Create a
third one with fdisk.
3.3. Create a LUKS encrypted partition:
# echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3
(the system will complain about a missing locking directory,
just ignore it.)
3.4. Open the encrypted device:
# echo 123|cryptsetup open --key-file - /dev/vda name
The Core 20 images contain the following udev rule which causes
the new block device to be mounted automatically. This mount is
what triggers the BUG:
ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \
RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"
3.5. Read the crash message
The attached screenshots show these steps being executed.
A few notes:
- The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here.
- In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system).
- All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example). |
[Impact]
An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap.
[Test Case]
$ dir=$(mktemp -d /tmp/lp1860231.XXXXX)
$ dmsetup create lp1860231 --notable
$ mount -t ext4 \
"/dev/dm-$(dmsetup info -c -o minor --noheadings lp1860231)" "$dir"
Now check the logs for a backtrace.
[Regression Potential]
The currently proposed fix introduces no chance of stability regressions. There is a chance of a very small performance regression since an additional pointer comparison is performed on each block layer request but this is unlikely to be noticeable.
[Original Report]
Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020
Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8
How to reproduce the crash in 3 "easy" steps:
1. Build a Core 20 image using the attached model file:
1.1. Install the ubuntu-image from latest/edge
$ sudo snap install --channel latest/edge ubuntu-image
1.2. Build the image
$ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model
2. Boot the image in kvm
2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the
stock ovmf from bionic may not work)
2.2. Boot the image
$ sudo kvm -snapshot -m 2048 -smp 4 \
-netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \
-device virtio-net-pci,netdev=mynet0 \
-drive file=pc.img,if=virtio \
-bios /usr/share/OVMF/OVMF_CODE.ms.fd
2.3. In the grub menu, edit the default option to include parameter
"systemd.debug-shell=1" in the kernel command line
2.4. Boot the kernel
3. Crash the kernel
3.1. When the system boots to the "Press enter to configure"
message, press ALT-F9 to enter the debug shell.
3.2. The system should have two partitions in /dev/vda. Create a
third one with fdisk.
3.3. Create a LUKS encrypted partition:
# echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3
(the system will complain about a missing locking directory,
just ignore it.)
3.4. Open the encrypted device:
# echo 123|cryptsetup open --key-file - /dev/vda name
The Core 20 images contain the following udev rule which causes
the new block device to be mounted automatically. This mount is
what triggers the BUG:
ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \
RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"
3.5. Read the crash message
The attached screenshots show these steps being executed.
A few notes:
- The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here.
- In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system).
- All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example). |
|
2020-01-22 14:48:58 |
Tyler Hicks |
description |
[Impact]
An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap.
[Test Case]
$ dir=$(mktemp -d /tmp/lp1860231.XXXXX)
$ dmsetup create lp1860231 --notable
$ mount -t ext4 \
"/dev/dm-$(dmsetup info -c -o minor --noheadings lp1860231)" "$dir"
Now check the logs for a backtrace.
[Regression Potential]
The currently proposed fix introduces no chance of stability regressions. There is a chance of a very small performance regression since an additional pointer comparison is performed on each block layer request but this is unlikely to be noticeable.
[Original Report]
Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020
Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8
How to reproduce the crash in 3 "easy" steps:
1. Build a Core 20 image using the attached model file:
1.1. Install the ubuntu-image from latest/edge
$ sudo snap install --channel latest/edge ubuntu-image
1.2. Build the image
$ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model
2. Boot the image in kvm
2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the
stock ovmf from bionic may not work)
2.2. Boot the image
$ sudo kvm -snapshot -m 2048 -smp 4 \
-netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \
-device virtio-net-pci,netdev=mynet0 \
-drive file=pc.img,if=virtio \
-bios /usr/share/OVMF/OVMF_CODE.ms.fd
2.3. In the grub menu, edit the default option to include parameter
"systemd.debug-shell=1" in the kernel command line
2.4. Boot the kernel
3. Crash the kernel
3.1. When the system boots to the "Press enter to configure"
message, press ALT-F9 to enter the debug shell.
3.2. The system should have two partitions in /dev/vda. Create a
third one with fdisk.
3.3. Create a LUKS encrypted partition:
# echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3
(the system will complain about a missing locking directory,
just ignore it.)
3.4. Open the encrypted device:
# echo 123|cryptsetup open --key-file - /dev/vda name
The Core 20 images contain the following udev rule which causes
the new block device to be mounted automatically. This mount is
what triggers the BUG:
ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \
RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"
3.5. Read the crash message
The attached screenshots show these steps being executed.
A few notes:
- The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here.
- In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system).
- All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example). |
[Impact]
An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap.
[Test Case]
$ dir=$(mktemp -d /tmp/lp1860231.XXXXX)
$ dmsetup create lp1860231 --notable
$ mount -t ext4 \
"/dev/dm-$(dmsetup info -c -o minor --noheadings lp1860231)" "$dir"
Now check the logs for a backtrace.
[Regression Potential]
The currently proposed fix introduces no chance of stability regressions. There is a chance of a very small performance regression since an additional pointer comparison is performed on each block layer request but this is unlikely to be noticeable.
[Original Report]
Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020
Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8
How to reproduce the crash in 3 "easy" steps:
1. Build a Core 20 image using the attached model file:
1.1. Install the ubuntu-image from latest/edge
$ sudo snap install --channel latest/edge ubuntu-image
1.2. Build the image
$ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model
2. Boot the image in kvm
2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the
stock ovmf from bionic may not work)
2.2. Boot the image
$ sudo kvm -snapshot -m 2048 -smp 4 \
-netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \
-device virtio-net-pci,netdev=mynet0 \
-drive file=pc.img,if=virtio \
-bios /usr/share/OVMF/OVMF_CODE.ms.fd
2.3. In the grub menu, edit the default option to include parameter
"systemd.debug-shell=1" in the kernel command line
2.4. Boot the kernel
3. Crash the kernel
3.1. When the system boots to the "Press enter to configure"
message, press ALT-F9 to enter the debug shell.
3.2. The system should have two partitions in /dev/vda. Create a
third one with fdisk.
3.3. Create a LUKS encrypted partition:
# echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3
(the system will complain about a missing locking directory,
just ignore it.)
3.4. Open the encrypted device:
# echo 123|cryptsetup open --key-file - /dev/vda name
The Core 20 images contain the following udev rule which causes
the new block device to be mounted automatically. This mount is
what triggers the BUG:
ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \
RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"
3.5. Read the crash message
The attached screenshots show these steps being executed.
A few notes:
- The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here.
- In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system).
- All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example). |
|
2020-01-23 08:53:12 |
Tyler Hicks |
linux (Ubuntu): assignee |
Andrea Righi (arighi) |
Stéphane Graber (stgraber) |
|
2020-01-23 08:53:49 |
Tyler Hicks |
linux (Ubuntu): assignee |
Stéphane Graber (stgraber) |
Stefan Bader (smb) |
|
2020-03-12 10:43:46 |
Ubuntu Kernel Bot |
tags |
|
verification-needed-focal |
|
2020-03-16 10:10:54 |
Stefan Bader |
linux (Ubuntu Xenial): status |
New |
Fix Committed |
|
2020-03-16 10:10:58 |
Stefan Bader |
linux (Ubuntu Bionic): status |
New |
Fix Committed |
|
2020-03-16 10:11:04 |
Stefan Bader |
linux (Ubuntu Disco): status |
New |
Fix Committed |
|
2020-03-16 10:11:15 |
Stefan Bader |
linux (Ubuntu Xenial): importance |
Undecided |
High |
|
2020-03-16 10:11:18 |
Stefan Bader |
linux (Ubuntu Bionic): importance |
Undecided |
High |
|
2020-03-16 10:11:22 |
Stefan Bader |
linux (Ubuntu Disco): importance |
Undecided |
High |
|
2020-03-16 10:11:29 |
Stefan Bader |
linux (Ubuntu Eoan): status |
New |
Fix Committed |
|
2020-03-16 10:11:40 |
Stefan Bader |
linux (Ubuntu): status |
Triaged |
Fix Released |
|
2020-03-16 10:11:45 |
Stefan Bader |
linux (Ubuntu Eoan): importance |
Undecided |
High |
|
2020-03-17 06:44:30 |
Ubuntu Kernel Bot |
tags |
verification-needed-focal |
verification-needed-focal verification-needed-xenial |
|
2020-03-17 16:14:21 |
Ubuntu Kernel Bot |
tags |
verification-needed-focal verification-needed-xenial |
verification-needed-bionic verification-needed-focal verification-needed-xenial |
|
2020-03-17 17:33:13 |
Ubuntu Kernel Bot |
tags |
verification-needed-bionic verification-needed-focal verification-needed-xenial |
verification-needed-bionic verification-needed-eoan verification-needed-focal verification-needed-xenial |
|
2020-04-06 12:20:18 |
Launchpad Janitor |
linux (Ubuntu Eoan): status |
Fix Committed |
Fix Released |
|
2020-04-06 12:50:54 |
Launchpad Janitor |
linux (Ubuntu Xenial): status |
Fix Committed |
Fix Released |
|
2020-04-06 12:50:54 |
Launchpad Janitor |
cve linked |
|
2020-8428 |
|
2020-04-06 16:52:57 |
Launchpad Janitor |
linux (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2020-04-06 16:52:57 |
Launchpad Janitor |
cve linked |
|
2020-8834 |
|
2020-07-02 19:51:47 |
Steve Langasek |
linux (Ubuntu Disco): status |
Fix Committed |
Won't Fix |
|