Activity log for bug #1860231

Date Who What changed Old value New value Message
2020-01-18 19:35:58 Claudio Matsuoka bug added bug
2020-01-18 19:35:58 Claudio Matsuoka attachment added Kernel backtrace https://bugs.launchpad.net/bugs/1860231/+attachment/5321425/+files/trace.txt
2020-01-18 19:37:29 Claudio Matsuoka attachment added Screenshot of the procedure to trigger the crash https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860231/+attachment/5321426/+files/Screenshot%20from%202020-01-18%2016-16-19.png
2020-01-18 19:50:49 Claudio Matsuoka bug added subscriber Michael Vogt
2020-01-18 20:00:08 Ubuntu Kernel Bot linux (Ubuntu): status New Incomplete
2020-01-18 20:07:34 Claudio Matsuoka attachment added Model file used to build the image https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860231/+attachment/5321427/+files/ubuntu-core-20-amd64.model
2020-01-20 09:22:10 Michael Vogt bug added subscriber Chris Coulson
2020-01-20 09:29:00 Andrea Righi linux (Ubuntu): assignee Andrea Righi (arighi)
2020-01-20 10:08:43 Tyler Hicks bug added subscriber Tyler Hicks
2020-01-20 14:34:43 Tyler Hicks description An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap. Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020 Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8 How to reproduce the crash in 3 "easy" steps: 1. Build a Core 20 image using the attached model file: 1.1. Install the ubuntu-image from latest/edge $ sudo snap install --channel latest/edge ubuntu-image 1.2. Build the image $ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model 2. Boot the image in kvm 2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the stock ovmf from bionic may not work) 2.2. Boot the image $ sudo kvm -snapshot -m 2048 -smp 4 \ -netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \ -device virtio-net-pci,netdev=mynet0 \ -drive file=pc.img,if=virtio \ -bios /usr/share/OVMF/OVMF_CODE.ms.fd 2.3. In the grub menu, edit the default option to include parameter "systemd.debug-shell=1" in the kernel command line 2.4. Boot the kernel 3. Crash the kernel 3.1. When the system boots to the "Press enter to configure" message, press ALT-F9 to enter the debug shell. 3.2. The system should have two partitions in /dev/vda. Create a third one with fdisk. 3.3. Create a LUKS encrypted partition: # echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3 (the system will complain about a missing locking directory, just ignore it.) 3.4. Open the encrypted device: # echo 123|cryptsetup open --key-file - /dev/vda name 3.5. Read the crash message The attached screenshots show these steps being executed. A few notes: - The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here. - In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system). - All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example). An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap. Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020 Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8 How to reproduce the crash in 3 "easy" steps: 1. Build a Core 20 image using the attached model file:    1.1. Install the ubuntu-image from latest/edge         $ sudo snap install --channel latest/edge ubuntu-image    1.2. Build the image         $ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model 2. Boot the image in kvm    2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the         stock ovmf from bionic may not work)    2.2. Boot the image         $ sudo kvm -snapshot -m 2048 -smp 4 \           -netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \           -device virtio-net-pci,netdev=mynet0 \           -drive file=pc.img,if=virtio \           -bios /usr/share/OVMF/OVMF_CODE.ms.fd    2.3. In the grub menu, edit the default option to include parameter         "systemd.debug-shell=1" in the kernel command line    2.4. Boot the kernel 3. Crash the kernel    3.1. When the system boots to the "Press enter to configure"         message, press ALT-F9 to enter the debug shell.    3.2. The system should have two partitions in /dev/vda. Create a         third one with fdisk.    3.3. Create a LUKS encrypted partition:         # echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3         (the system will complain about a missing locking directory,         just ignore it.)    3.4. Open the encrypted device:         # echo 123|cryptsetup open --key-file - /dev/vda name The Core 20 images contain the following udev rule which causes the new block device to be mounted automatically. This mount is what triggers the BUG: ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \ RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"    3.5. Read the crash message The attached screenshots show these steps being executed. A few notes: - The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here. - In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system). - All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example).
2020-01-21 14:26:27 Michael Vogt attachment added snapd_1337.2.43.1_amd64.deb https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860231/+attachment/5321900/+files/snapd_1337.2.43.1_amd64.deb
2020-01-22 11:51:17 Stefan Bader bug added subscriber Stefan Bader
2020-01-22 14:46:45 Stefan Bader linux (Ubuntu): status Incomplete Triaged
2020-01-22 14:46:53 Stefan Bader linux (Ubuntu): importance Undecided High
2020-01-22 14:47:19 Stefan Bader nominated for series Ubuntu Xenial
2020-01-22 14:47:19 Stefan Bader bug task added linux (Ubuntu Xenial)
2020-01-22 14:47:19 Stefan Bader nominated for series Ubuntu Eoan
2020-01-22 14:47:19 Stefan Bader bug task added linux (Ubuntu Eoan)
2020-01-22 14:47:19 Stefan Bader nominated for series Ubuntu Bionic
2020-01-22 14:47:19 Stefan Bader bug task added linux (Ubuntu Bionic)
2020-01-22 14:47:38 Stefan Bader nominated for series Ubuntu Disco
2020-01-22 14:47:38 Stefan Bader bug task added linux (Ubuntu Disco)
2020-01-22 14:48:41 Tyler Hicks description An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap. Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020 Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8 How to reproduce the crash in 3 "easy" steps: 1. Build a Core 20 image using the attached model file:    1.1. Install the ubuntu-image from latest/edge         $ sudo snap install --channel latest/edge ubuntu-image    1.2. Build the image         $ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model 2. Boot the image in kvm    2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the         stock ovmf from bionic may not work)    2.2. Boot the image         $ sudo kvm -snapshot -m 2048 -smp 4 \           -netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \           -device virtio-net-pci,netdev=mynet0 \           -drive file=pc.img,if=virtio \           -bios /usr/share/OVMF/OVMF_CODE.ms.fd    2.3. In the grub menu, edit the default option to include parameter         "systemd.debug-shell=1" in the kernel command line    2.4. Boot the kernel 3. Crash the kernel    3.1. When the system boots to the "Press enter to configure"         message, press ALT-F9 to enter the debug shell.    3.2. The system should have two partitions in /dev/vda. Create a         third one with fdisk.    3.3. Create a LUKS encrypted partition:         # echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3         (the system will complain about a missing locking directory,         just ignore it.)    3.4. Open the encrypted device:         # echo 123|cryptsetup open --key-file - /dev/vda name The Core 20 images contain the following udev rule which causes the new block device to be mounted automatically. This mount is what triggers the BUG: ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \ RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"    3.5. Read the crash message The attached screenshots show these steps being executed. A few notes: - The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here. - In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system). - All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example). [Impact] An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap. [Test Case] $ dir=$(mktemp -d /tmp/lp1860231.XXXXX) $ dmsetup create lp1860231 --notable $ mount -t ext4 \ "/dev/dm-$(dmsetup info -c -o minor --noheadings lp1860231)" "$dir" Now check the logs for a backtrace. [Regression Potential] The currently proposed fix introduces no chance of stability regressions. There is a chance of a very small performance regression since an additional pointer comparison is performed on each block layer request but this is unlikely to be noticeable. [Original Report] Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020 Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8 How to reproduce the crash in 3 "easy" steps: 1. Build a Core 20 image using the attached model file:    1.1. Install the ubuntu-image from latest/edge         $ sudo snap install --channel latest/edge ubuntu-image    1.2. Build the image         $ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model 2. Boot the image in kvm    2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the         stock ovmf from bionic may not work)    2.2. Boot the image         $ sudo kvm -snapshot -m 2048 -smp 4 \           -netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \           -device virtio-net-pci,netdev=mynet0 \           -drive file=pc.img,if=virtio \           -bios /usr/share/OVMF/OVMF_CODE.ms.fd    2.3. In the grub menu, edit the default option to include parameter         "systemd.debug-shell=1" in the kernel command line    2.4. Boot the kernel 3. Crash the kernel    3.1. When the system boots to the "Press enter to configure"         message, press ALT-F9 to enter the debug shell.    3.2. The system should have two partitions in /dev/vda. Create a         third one with fdisk.    3.3. Create a LUKS encrypted partition:         # echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3         (the system will complain about a missing locking directory,         just ignore it.)    3.4. Open the encrypted device:         # echo 123|cryptsetup open --key-file - /dev/vda name         The Core 20 images contain the following udev rule which causes         the new block device to be mounted automatically. This mount is         what triggers the BUG:         ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \         RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"    3.5. Read the crash message The attached screenshots show these steps being executed. A few notes: - The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here. - In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system). - All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example).
2020-01-22 14:48:58 Tyler Hicks description [Impact] An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap. [Test Case] $ dir=$(mktemp -d /tmp/lp1860231.XXXXX) $ dmsetup create lp1860231 --notable $ mount -t ext4 \ "/dev/dm-$(dmsetup info -c -o minor --noheadings lp1860231)" "$dir" Now check the logs for a backtrace. [Regression Potential] The currently proposed fix introduces no chance of stability regressions. There is a chance of a very small performance regression since an additional pointer comparison is performed on each block layer request but this is unlikely to be noticeable. [Original Report] Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020 Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8 How to reproduce the crash in 3 "easy" steps: 1. Build a Core 20 image using the attached model file:    1.1. Install the ubuntu-image from latest/edge         $ sudo snap install --channel latest/edge ubuntu-image    1.2. Build the image         $ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model 2. Boot the image in kvm    2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the         stock ovmf from bionic may not work)    2.2. Boot the image         $ sudo kvm -snapshot -m 2048 -smp 4 \           -netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \           -device virtio-net-pci,netdev=mynet0 \           -drive file=pc.img,if=virtio \           -bios /usr/share/OVMF/OVMF_CODE.ms.fd    2.3. In the grub menu, edit the default option to include parameter         "systemd.debug-shell=1" in the kernel command line    2.4. Boot the kernel 3. Crash the kernel    3.1. When the system boots to the "Press enter to configure"         message, press ALT-F9 to enter the debug shell.    3.2. The system should have two partitions in /dev/vda. Create a         third one with fdisk.    3.3. Create a LUKS encrypted partition:         # echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3         (the system will complain about a missing locking directory,         just ignore it.)    3.4. Open the encrypted device:         # echo 123|cryptsetup open --key-file - /dev/vda name         The Core 20 images contain the following udev rule which causes         the new block device to be mounted automatically. This mount is         what triggers the BUG:         ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \         RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"    3.5. Read the crash message The attached screenshots show these steps being executed. A few notes: - The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here. - In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system). - All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example). [Impact] An attempt to run cryptsetup open on a newly created LUKS partition on Ubuntu Core 20 causes a kernel crash. This happens in 100% of the attempts on the snapd Core 20 installation test, but on an image created to reproduce this bug it happens only when certain parameters are passed to cryptsetup. Both images are built similarly so the reason for this discrepancy is unknown. The kernel was installed from pc-kernel_374.snap. [Test Case] $ dir=$(mktemp -d /tmp/lp1860231.XXXXX) $ dmsetup create lp1860231 --notable $ mount -t ext4 \   "/dev/dm-$(dmsetup info -c -o minor --noheadings lp1860231)" "$dir" Now check the logs for a backtrace. [Regression Potential] The currently proposed fix introduces no chance of stability regressions. There is a chance of a very small performance regression since an additional pointer comparison is performed on each block layer request but this is unlikely to be noticeable. [Original Report] Linux version 5.4.0-11-generic (buildd@lgw01-amd64-021) (gcc version 9.2.1 20200104 (Ubuntu 9.2.1-22ubuntu2)) #14-Ubuntu SMP Thu Jan 9 16:14:26 UTC 2020 Version signature: Ubuntu 5.4.0-11.14-generic 5.4.8 How to reproduce the crash in 3 "easy" steps: 1. Build a Core 20 image using the attached model file:    1.1. Install the ubuntu-image from latest/edge         $ sudo snap install --channel latest/edge ubuntu-image    1.2. Build the image         $ sudo ubuntu-image --image-size=4G ubuntu-core-20-amd64.model 2. Boot the image in kvm    2.1. Install ovmf version 0~20190606.20d2e5a1-2ubuntu1 or newer (the         stock ovmf from bionic may not work)    2.2. Boot the image         $ sudo kvm -snapshot -m 2048 -smp 4 \           -netdev user,id=mynet0,hostfwd=tcp::8022-:22,hostfwd=tcp::8090-:80 \           -device virtio-net-pci,netdev=mynet0 \           -drive file=pc.img,if=virtio \           -bios /usr/share/OVMF/OVMF_CODE.ms.fd    2.3. In the grub menu, edit the default option to include parameter         "systemd.debug-shell=1" in the kernel command line    2.4. Boot the kernel 3. Crash the kernel    3.1. When the system boots to the "Press enter to configure"         message, press ALT-F9 to enter the debug shell.    3.2. The system should have two partitions in /dev/vda. Create a         third one with fdisk.    3.3. Create a LUKS encrypted partition:         # echo 123|cryptsetup luksFormat -q --type luks2 --key-file - --pbkdf argon2i --iter-time 1 /dev/vda3         (the system will complain about a missing locking directory,         just ignore it.)    3.4. Open the encrypted device:         # echo 123|cryptsetup open --key-file - /dev/vda name         The Core 20 images contain the following udev rule which causes         the new block device to be mounted automatically. This mount is         what triggers the BUG:         ACTION=="add", SUBSYSTEM=="block", KERNEL!="loop*", KERNEL!="ram*" \         RUN+="/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/%k"    3.5. Read the crash message The attached screenshots show these steps being executed. A few notes: - The backtrace seems very similar to the one reported in bug #1835279, however that problem was possibly caused by a race between partition creation and LUKS formatting. This time it doesn't seem to be the case, delays between commands don't help us here. - In the test case above using large values of KDF iter-time may prevent the crash. I successfully opened the device in kernel 5.4.0-9 with --iter-time larger than 100, but 5.4.0-11 seems to require values closer to 1000. Regardless of the --iter-time value used, the crash always happen when running the test in a spread-driven automated environment (same kernel with image built in the same way, some other variable seems to be disturbing the system). - All necessary modules are loaded before the LUKS partition creation (i.e. it doesn't seem to be caused by a race between dm-crypt loading and cryptsetup luksFormat for example).
2020-01-23 08:53:12 Tyler Hicks linux (Ubuntu): assignee Andrea Righi (arighi) Stéphane Graber (stgraber)
2020-01-23 08:53:49 Tyler Hicks linux (Ubuntu): assignee Stéphane Graber (stgraber) Stefan Bader (smb)
2020-03-12 10:43:46 Ubuntu Kernel Bot tags verification-needed-focal
2020-03-16 10:10:54 Stefan Bader linux (Ubuntu Xenial): status New Fix Committed
2020-03-16 10:10:58 Stefan Bader linux (Ubuntu Bionic): status New Fix Committed
2020-03-16 10:11:04 Stefan Bader linux (Ubuntu Disco): status New Fix Committed
2020-03-16 10:11:15 Stefan Bader linux (Ubuntu Xenial): importance Undecided High
2020-03-16 10:11:18 Stefan Bader linux (Ubuntu Bionic): importance Undecided High
2020-03-16 10:11:22 Stefan Bader linux (Ubuntu Disco): importance Undecided High
2020-03-16 10:11:29 Stefan Bader linux (Ubuntu Eoan): status New Fix Committed
2020-03-16 10:11:40 Stefan Bader linux (Ubuntu): status Triaged Fix Released
2020-03-16 10:11:45 Stefan Bader linux (Ubuntu Eoan): importance Undecided High
2020-03-17 06:44:30 Ubuntu Kernel Bot tags verification-needed-focal verification-needed-focal verification-needed-xenial
2020-03-17 16:14:21 Ubuntu Kernel Bot tags verification-needed-focal verification-needed-xenial verification-needed-bionic verification-needed-focal verification-needed-xenial
2020-03-17 17:33:13 Ubuntu Kernel Bot tags verification-needed-bionic verification-needed-focal verification-needed-xenial verification-needed-bionic verification-needed-eoan verification-needed-focal verification-needed-xenial
2020-04-06 12:20:18 Launchpad Janitor linux (Ubuntu Eoan): status Fix Committed Fix Released
2020-04-06 12:50:54 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2020-04-06 12:50:54 Launchpad Janitor cve linked 2020-8428
2020-04-06 16:52:57 Launchpad Janitor linux (Ubuntu Bionic): status Fix Committed Fix Released
2020-04-06 16:52:57 Launchpad Janitor cve linked 2020-8834
2020-07-02 19:51:47 Steve Langasek linux (Ubuntu Disco): status Fix Committed Won't Fix