Activity log for bug #1615381

Date Who What changed Old value New value Message
2016-08-21 13:24:18 Jarno Suni bug added bug
2016-08-21 13:24:40 Jarno Suni information type Private Security Public Security
2016-08-23 22:56:31 Emily Ratliff information type Public Security Public
2016-09-22 09:05:01 Jarno Suni description This may happen, if you boot one of the older kernels, that is not protected by /etc/apt/apt.conf.d/01autoremove-kernels Workaround: run /etc/kernel/postinst.d/&apt-auto-removal during each boot (e.g. by using cron). In shell: $ uname -r 4.4.0-22-generic $ apt-get -s autoremove NOTE: This is only a simulation! apt-get needs root privileges for real execution. Keep also in mind that locking is deactivated, so don't depend on the relevance to the real current situation! Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be REMOVED: linux-headers-4.4.0-21 linux-headers-4.4.0-21-generic linux-headers-4.4.0-22 linux-headers-4.4.0-22-generic linux-headers-4.4.0-31-generic linux-image-4.4.0-21-generic linux-image-4.4.0-22-generic linux-image-4.4.0-31-generic linux-image-extra-4.4.0-21-generic linux-image-extra-4.4.0-22-generic linux-image-extra-4.4.0-31-generic 0 upgraded, 0 newly installed, 11 to remove and 13 not upgraded. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: apt 1.2.12~ubuntu16.04.1 ProcVersionSignature: Ubuntu 4.4.0-22.40-generic 4.4.8 Uname: Linux 4.4.0-22-generic x86_64 ApportVersion: 2.20.1-0ubuntu2.1 Architecture: amd64 CurrentDesktop: XFCE Date: Sun Aug 21 16:11:27 2016 EcryptfsInUse: Yes InstallationDate: Installed on 2016-04-28 (114 days ago) InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.1) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) modified.conffile..etc.kernel.postinst.d.apt-auto-removal: [modified] mtime.conffile..etc.kernel.postinst.d.apt-auto-removal: 2016-07-30T12:15:32.706300 This may happen, if you boot one of the older kernels, that is not protected by /etc/apt/apt.conf.d/01autoremove-kernels Workaround: run /etc/kernel/postinst.d/apt-auto-removal during each boot (e.g. by using cron). Note: The workaround breaks autoremoving feature of new unneeded kernels in unattended-upgrades i.e. the setting 'Unattended-Upgrade::Remove-New-Unused-Dependencies "true"' (which is default in 16.04 unless 'Unattended-Upgrade::Remove-Unused-Dependencies "true"' is set in '/etc/apt/apt.conf.d/50unattended-upgrades'. In shell: $ uname -r 4.4.0-22-generic $ apt-get -s autoremove NOTE: This is only a simulation!       apt-get needs root privileges for real execution.       Keep also in mind that locking is deactivated,       so don't depend on the relevance to the real current situation! Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be REMOVED:   linux-headers-4.4.0-21 linux-headers-4.4.0-21-generic linux-headers-4.4.0-22   linux-headers-4.4.0-22-generic linux-headers-4.4.0-31-generic   linux-image-4.4.0-21-generic linux-image-4.4.0-22-generic   linux-image-4.4.0-31-generic linux-image-extra-4.4.0-21-generic   linux-image-extra-4.4.0-22-generic linux-image-extra-4.4.0-31-generic 0 upgraded, 0 newly installed, 11 to remove and 13 not upgraded. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: apt 1.2.12~ubuntu16.04.1 ProcVersionSignature: Ubuntu 4.4.0-22.40-generic 4.4.8 Uname: Linux 4.4.0-22-generic x86_64 ApportVersion: 2.20.1-0ubuntu2.1 Architecture: amd64 CurrentDesktop: XFCE Date: Sun Aug 21 16:11:27 2016 EcryptfsInUse: Yes InstallationDate: Installed on 2016-04-28 (114 days ago) InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.1) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) modified.conffile..etc.kernel.postinst.d.apt-auto-removal: [modified] mtime.conffile..etc.kernel.postinst.d.apt-auto-removal: 2016-07-30T12:15:32.706300
2017-08-30 22:04:19 Doug Smythies bug added subscriber Doug Smythies
2017-08-30 22:04:27 Launchpad Janitor apt (Ubuntu): status New Confirmed
2017-10-14 01:41:45 Robie Basak tags amd64 apport-bug xenial amd64 apport-bug kernel-autoremove xenial
2017-12-19 20:26:14 Bruno Karklis Diniz bug added subscriber Bruno Karklis Diniz
2018-02-16 20:49:54 Balint Reczey bug task added unattended-upgrades (Ubuntu)
2018-02-16 20:54:12 Balint Reczey unattended-upgrades (Ubuntu): status New Confirmed
2018-02-22 16:51:06 Balint Reczey unattended-upgrades (Ubuntu): status Confirmed In Progress
2018-03-01 16:32:49 Launchpad Janitor unattended-upgrades (Ubuntu): status In Progress Fix Released
2018-05-24 13:46:33 Eric Desrochers nominated for series Ubuntu Xenial
2018-05-24 13:46:33 Eric Desrochers bug task added apt (Ubuntu Xenial)
2018-05-24 13:46:33 Eric Desrochers bug task added unattended-upgrades (Ubuntu Xenial)
2018-05-24 13:46:33 Eric Desrochers nominated for series Ubuntu Trusty
2018-05-24 13:46:33 Eric Desrochers bug task added apt (Ubuntu Trusty)
2018-05-24 13:46:33 Eric Desrochers bug task added unattended-upgrades (Ubuntu Trusty)
2018-05-24 13:46:47 Eric Desrochers unattended-upgrades (Ubuntu Xenial): importance Undecided High
2018-05-24 13:46:53 Eric Desrochers unattended-upgrades (Ubuntu Xenial): status New Confirmed
2018-05-24 13:51:31 Eric Desrochers apt (Ubuntu): status Confirmed Won't Fix
2018-05-24 13:51:33 Eric Desrochers apt (Ubuntu Trusty): status New Won't Fix
2018-05-24 13:51:36 Eric Desrochers apt (Ubuntu Xenial): status New Won't Fix
2018-05-24 13:51:51 Eric Desrochers nominated for series Ubuntu Artful
2018-05-24 13:51:51 Eric Desrochers bug task added apt (Ubuntu Artful)
2018-05-24 13:51:51 Eric Desrochers bug task added unattended-upgrades (Ubuntu Artful)
2018-05-24 13:52:03 Eric Desrochers apt (Ubuntu Artful): status New Won't Fix
2018-05-24 15:02:41 Eric Desrochers bug added subscriber Eric Desrochers
2018-05-24 22:46:40 Dominique Poulain bug added subscriber Dominique Poulain
2018-05-31 20:21:12 Eric Desrochers tags amd64 apport-bug kernel-autoremove xenial amd64 apport-bug kernel-autoremove sts xenial
2018-09-19 10:32:52 Ove Risberg bug added subscriber Ove Risberg
2018-11-08 15:38:12 Balint Reczey unattended-upgrades (Ubuntu Artful): status New Won't Fix
2018-12-03 19:14:24 Brian Murray unattended-upgrades (Ubuntu Xenial): status Confirmed Fix Committed
2018-12-03 19:14:27 Brian Murray bug added subscriber Ubuntu Stable Release Updates Team
2018-12-03 19:14:29 Brian Murray bug added subscriber SRU Verification
2018-12-03 19:14:34 Brian Murray tags amd64 apport-bug kernel-autoremove sts xenial amd64 apport-bug kernel-autoremove sts verification-needed verification-needed-xenial xenial
2018-12-05 03:35:44 Mathew Hodson bug added subscriber Mathew Hodson
2019-03-14 04:11:16 Mathew Hodson unattended-upgrades (Ubuntu): importance Undecided High
2019-03-14 04:11:19 Mathew Hodson unattended-upgrades (Ubuntu Artful): importance Undecided High
2019-03-14 04:11:22 Mathew Hodson unattended-upgrades (Ubuntu Trusty): importance Undecided Low
2019-04-08 17:32:38 Balint Reczey tags amd64 apport-bug kernel-autoremove sts verification-needed verification-needed-xenial xenial amd64 apport-bug kernel-autoremove sts verification-done verification-done-xenial xenial
2019-04-25 10:50:00 Launchpad Janitor unattended-upgrades (Ubuntu Xenial): status Fix Committed Fix Released
2019-04-26 03:41:30 Mathew Hodson removed subscriber Mathew Hodson
2019-04-26 03:46:18 Mathew Hodson bug task deleted apt (Ubuntu Artful)
2019-04-26 03:46:22 Mathew Hodson bug task deleted apt (Ubuntu Xenial)
2019-04-26 03:46:28 Mathew Hodson bug task deleted apt (Ubuntu Trusty)
2019-04-26 03:46:34 Mathew Hodson bug task deleted apt (Ubuntu)
2019-04-26 03:47:28 Mathew Hodson unattended-upgrades (Ubuntu Trusty): status New Won't Fix
2019-04-26 07:52:48 Balint Reczey bug task added apt (Ubuntu)
2019-04-26 07:53:01 Balint Reczey apt (Ubuntu): status New Confirmed
2019-10-18 00:46:16 Bruno Karklis Diniz removed subscriber Bruno Karklis Diniz
2020-06-12 05:14:27 Kai Kasurinen bug added subscriber Kai Kasurinen
2020-07-14 15:47:16 Dan Streetman tags amd64 apport-bug kernel-autoremove sts verification-done verification-done-xenial xenial amd64 apport-bug kernel-autoremove seg sts verification-done verification-done-xenial xenial
2020-07-14 17:36:53 Julian Andres Klode apt (Ubuntu): status Confirmed In Progress
2020-10-14 15:45:42 Matthieu Clemenceau tags amd64 apport-bug kernel-autoremove seg sts verification-done verification-done-xenial xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done verification-done-xenial xenial
2021-01-15 16:30:28 Launchpad Janitor apt (Ubuntu): status In Progress Fix Released
2021-02-15 10:00:31 Julian Andres Klode description This may happen, if you boot one of the older kernels, that is not protected by /etc/apt/apt.conf.d/01autoremove-kernels Workaround: run /etc/kernel/postinst.d/apt-auto-removal during each boot (e.g. by using cron). Note: The workaround breaks autoremoving feature of new unneeded kernels in unattended-upgrades i.e. the setting 'Unattended-Upgrade::Remove-New-Unused-Dependencies "true"' (which is default in 16.04 unless 'Unattended-Upgrade::Remove-Unused-Dependencies "true"' is set in '/etc/apt/apt.conf.d/50unattended-upgrades'. In shell: $ uname -r 4.4.0-22-generic $ apt-get -s autoremove NOTE: This is only a simulation!       apt-get needs root privileges for real execution.       Keep also in mind that locking is deactivated,       so don't depend on the relevance to the real current situation! Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be REMOVED:   linux-headers-4.4.0-21 linux-headers-4.4.0-21-generic linux-headers-4.4.0-22   linux-headers-4.4.0-22-generic linux-headers-4.4.0-31-generic   linux-image-4.4.0-21-generic linux-image-4.4.0-22-generic   linux-image-4.4.0-31-generic linux-image-extra-4.4.0-21-generic   linux-image-extra-4.4.0-22-generic linux-image-extra-4.4.0-31-generic 0 upgraded, 0 newly installed, 11 to remove and 13 not upgraded. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: apt 1.2.12~ubuntu16.04.1 ProcVersionSignature: Ubuntu 4.4.0-22.40-generic 4.4.8 Uname: Linux 4.4.0-22-generic x86_64 ApportVersion: 2.20.1-0ubuntu2.1 Architecture: amd64 CurrentDesktop: XFCE Date: Sun Aug 21 16:11:27 2016 EcryptfsInUse: Yes InstallationDate: Installed on 2016-04-28 (114 days ago) InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.1) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) modified.conffile..etc.kernel.postinst.d.apt-auto-removal: [modified] mtime.conffile..etc.kernel.postinst.d.apt-auto-removal: 2016-07-30T12:15:32.706300 [Impact] APT will try and fail to remove the currently running kernel, when booted into an older kernel that is not protected. May wreak some havoc if mixed with other operations to the point that apt goes weird and needs manual fixing up. [Test case] - Install new kernel - Reboot into kernel not listed as protected in 01autoremove-kernels - Run autoremove [Where problems could occur] We may more easily run out of space in /boot. hirsute has new autoremoval code that runs completely at runtime; but that seems a bit large to SRU after only a few weeks in hirsute. Hence, we should protect the current kernel _in addition_ to the other kernels, just like unattended-upgrades and update-manager do. This increases the risk of filling up /boot compared to older apt versions, but is at the same level as unattended-upgrades and update-manager. [Original bug report] This may happen, if you boot one of the older kernels, that is not protected by /etc/apt/apt.conf.d/01autoremove-kernels Workaround: run /etc/kernel/postinst.d/apt-auto-removal during each boot (e.g. by using cron). Note: The workaround breaks autoremoving feature of new unneeded kernels in unattended-upgrades i.e. the setting 'Unattended-Upgrade::Remove-New-Unused-Dependencies "true"' (which is default in 16.04 unless 'Unattended-Upgrade::Remove-Unused-Dependencies "true"' is set in '/etc/apt/apt.conf.d/50unattended-upgrades'. In shell: $ uname -r 4.4.0-22-generic $ apt-get -s autoremove NOTE: This is only a simulation!       apt-get needs root privileges for real execution.       Keep also in mind that locking is deactivated,       so don't depend on the relevance to the real current situation! Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be REMOVED:   linux-headers-4.4.0-21 linux-headers-4.4.0-21-generic linux-headers-4.4.0-22   linux-headers-4.4.0-22-generic linux-headers-4.4.0-31-generic   linux-image-4.4.0-21-generic linux-image-4.4.0-22-generic   linux-image-4.4.0-31-generic linux-image-extra-4.4.0-21-generic   linux-image-extra-4.4.0-22-generic linux-image-extra-4.4.0-31-generic 0 upgraded, 0 newly installed, 11 to remove and 13 not upgraded. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: apt 1.2.12~ubuntu16.04.1 ProcVersionSignature: Ubuntu 4.4.0-22.40-generic 4.4.8 Uname: Linux 4.4.0-22-generic x86_64 ApportVersion: 2.20.1-0ubuntu2.1 Architecture: amd64 CurrentDesktop: XFCE Date: Sun Aug 21 16:11:27 2016 EcryptfsInUse: Yes InstallationDate: Installed on 2016-04-28 (114 days ago) InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.1) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) modified.conffile..etc.kernel.postinst.d.apt-auto-removal: [modified] mtime.conffile..etc.kernel.postinst.d.apt-auto-removal: 2016-07-30T12:15:32.706300
2021-02-18 15:42:12 Julian Andres Klode nominated for series Ubuntu Focal
2021-02-18 15:42:12 Julian Andres Klode bug task added apt (Ubuntu Focal)
2021-02-18 15:42:12 Julian Andres Klode bug task added unattended-upgrades (Ubuntu Focal)
2021-02-18 15:42:12 Julian Andres Klode nominated for series Ubuntu Groovy
2021-02-18 15:42:12 Julian Andres Klode bug task added apt (Ubuntu Groovy)
2021-02-18 15:42:12 Julian Andres Klode bug task added unattended-upgrades (Ubuntu Groovy)
2021-02-18 15:42:12 Julian Andres Klode nominated for series Ubuntu Hirsute
2021-02-18 15:42:12 Julian Andres Klode bug task added apt (Ubuntu Hirsute)
2021-02-18 15:42:12 Julian Andres Klode bug task added unattended-upgrades (Ubuntu Hirsute)
2021-02-18 15:42:12 Julian Andres Klode nominated for series Ubuntu Bionic
2021-02-18 15:42:12 Julian Andres Klode bug task added apt (Ubuntu Bionic)
2021-02-18 15:42:12 Julian Andres Klode bug task added unattended-upgrades (Ubuntu Bionic)
2021-02-18 15:42:22 Julian Andres Klode bug task deleted unattended-upgrades (Ubuntu Bionic)
2021-02-18 15:42:41 Julian Andres Klode bug task deleted unattended-upgrades (Ubuntu Focal)
2021-02-18 15:42:51 Julian Andres Klode bug task deleted unattended-upgrades (Ubuntu Groovy)
2021-02-18 15:43:10 Julian Andres Klode bug task deleted unattended-upgrades (Ubuntu Hirsute)
2021-02-18 15:43:18 Julian Andres Klode apt (Ubuntu Groovy): status New Confirmed
2021-02-18 15:43:20 Julian Andres Klode apt (Ubuntu Groovy): status Confirmed Triaged
2021-02-18 15:43:23 Julian Andres Klode apt (Ubuntu Groovy): status Triaged Confirmed
2021-02-18 15:43:25 Julian Andres Klode apt (Ubuntu Focal): status New Confirmed
2021-02-18 15:43:28 Julian Andres Klode apt (Ubuntu Bionic): status New Confirmed
2021-02-18 15:44:33 Julian Andres Klode apt (Ubuntu Groovy): status Confirmed Triaged
2021-03-05 15:02:21 Julian Andres Klode description [Impact] APT will try and fail to remove the currently running kernel, when booted into an older kernel that is not protected. May wreak some havoc if mixed with other operations to the point that apt goes weird and needs manual fixing up. [Test case] - Install new kernel - Reboot into kernel not listed as protected in 01autoremove-kernels - Run autoremove [Where problems could occur] We may more easily run out of space in /boot. hirsute has new autoremoval code that runs completely at runtime; but that seems a bit large to SRU after only a few weeks in hirsute. Hence, we should protect the current kernel _in addition_ to the other kernels, just like unattended-upgrades and update-manager do. This increases the risk of filling up /boot compared to older apt versions, but is at the same level as unattended-upgrades and update-manager. [Original bug report] This may happen, if you boot one of the older kernels, that is not protected by /etc/apt/apt.conf.d/01autoremove-kernels Workaround: run /etc/kernel/postinst.d/apt-auto-removal during each boot (e.g. by using cron). Note: The workaround breaks autoremoving feature of new unneeded kernels in unattended-upgrades i.e. the setting 'Unattended-Upgrade::Remove-New-Unused-Dependencies "true"' (which is default in 16.04 unless 'Unattended-Upgrade::Remove-Unused-Dependencies "true"' is set in '/etc/apt/apt.conf.d/50unattended-upgrades'. In shell: $ uname -r 4.4.0-22-generic $ apt-get -s autoremove NOTE: This is only a simulation!       apt-get needs root privileges for real execution.       Keep also in mind that locking is deactivated,       so don't depend on the relevance to the real current situation! Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be REMOVED:   linux-headers-4.4.0-21 linux-headers-4.4.0-21-generic linux-headers-4.4.0-22   linux-headers-4.4.0-22-generic linux-headers-4.4.0-31-generic   linux-image-4.4.0-21-generic linux-image-4.4.0-22-generic   linux-image-4.4.0-31-generic linux-image-extra-4.4.0-21-generic   linux-image-extra-4.4.0-22-generic linux-image-extra-4.4.0-31-generic 0 upgraded, 0 newly installed, 11 to remove and 13 not upgraded. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: apt 1.2.12~ubuntu16.04.1 ProcVersionSignature: Ubuntu 4.4.0-22.40-generic 4.4.8 Uname: Linux 4.4.0-22-generic x86_64 ApportVersion: 2.20.1-0ubuntu2.1 Architecture: amd64 CurrentDesktop: XFCE Date: Sun Aug 21 16:11:27 2016 EcryptfsInUse: Yes InstallationDate: Installed on 2016-04-28 (114 days ago) InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.1) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) modified.conffile..etc.kernel.postinst.d.apt-auto-removal: [modified] mtime.conffile..etc.kernel.postinst.d.apt-auto-removal: 2016-07-30T12:15:32.706300 [Impact] APT will try and fail to remove the currently running kernel, when booted into an older kernel that is not protected. May wreak some havoc if mixed with other operations to the point that apt goes weird and needs manual fixing up. [Test case] For the SRUs we have included an automated test case that starts with an empty autoremove config file, and then checks that the running kernel is protected at runtime. You can also test manually, but it's not necessary: - Install new kernel - Reboot into kernel not listed as protected in 01autoremove-kernels - Run autoremove [Where problems could occur] We may more easily run out of space in /boot. hirsute has new autoremoval code that runs completely at runtime; but that seems a bit large to SRU after only a few weeks in hirsute. Hence, we should protect the current kernel _in addition_ to the other kernels, just like unattended-upgrades and update-manager do. This increases the risk of filling up /boot compared to older apt versions, but is at the same level as unattended-upgrades and update-manager. [Original bug report] This may happen, if you boot one of the older kernels, that is not protected by /etc/apt/apt.conf.d/01autoremove-kernels Workaround: run /etc/kernel/postinst.d/apt-auto-removal during each boot (e.g. by using cron). Note: The workaround breaks autoremoving feature of new unneeded kernels in unattended-upgrades i.e. the setting 'Unattended-Upgrade::Remove-New-Unused-Dependencies "true"' (which is default in 16.04 unless 'Unattended-Upgrade::Remove-Unused-Dependencies "true"' is set in '/etc/apt/apt.conf.d/50unattended-upgrades'. In shell: $ uname -r 4.4.0-22-generic $ apt-get -s autoremove NOTE: This is only a simulation!       apt-get needs root privileges for real execution.       Keep also in mind that locking is deactivated,       so don't depend on the relevance to the real current situation! Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be REMOVED:   linux-headers-4.4.0-21 linux-headers-4.4.0-21-generic linux-headers-4.4.0-22   linux-headers-4.4.0-22-generic linux-headers-4.4.0-31-generic   linux-image-4.4.0-21-generic linux-image-4.4.0-22-generic   linux-image-4.4.0-31-generic linux-image-extra-4.4.0-21-generic   linux-image-extra-4.4.0-22-generic linux-image-extra-4.4.0-31-generic 0 upgraded, 0 newly installed, 11 to remove and 13 not upgraded. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: apt 1.2.12~ubuntu16.04.1 ProcVersionSignature: Ubuntu 4.4.0-22.40-generic 4.4.8 Uname: Linux 4.4.0-22-generic x86_64 ApportVersion: 2.20.1-0ubuntu2.1 Architecture: amd64 CurrentDesktop: XFCE Date: Sun Aug 21 16:11:27 2016 EcryptfsInUse: Yes InstallationDate: Installed on 2016-04-28 (114 days ago) InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.1) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) modified.conffile..etc.kernel.postinst.d.apt-auto-removal: [modified] mtime.conffile..etc.kernel.postinst.d.apt-auto-removal: 2016-07-30T12:15:32.706300
2021-03-05 18:59:57 Julian Andres Klode apt (Ubuntu Groovy): status Triaged In Progress
2021-03-24 22:33:54 Brian Murray apt (Ubuntu Groovy): status In Progress Fix Committed
2021-03-24 22:34:05 Brian Murray tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done verification-done-xenial xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-xenial verification-needed verification-needed-groovy xenial
2021-03-25 13:34:33 Łukasz Zemczak apt (Ubuntu Focal): status Confirmed Fix Committed
2021-03-25 13:34:41 Łukasz Zemczak tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-xenial verification-needed verification-needed-groovy xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-xenial verification-needed verification-needed-focal verification-needed-groovy xenial
2021-03-25 13:41:14 Łukasz Zemczak apt (Ubuntu Bionic): status Confirmed Fix Committed
2021-03-25 13:41:22 Łukasz Zemczak tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-xenial verification-needed verification-needed-focal verification-needed-groovy xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-xenial verification-needed verification-needed-bionic verification-needed-focal verification-needed-groovy xenial
2021-03-30 09:25:55 Julian Andres Klode tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-xenial verification-needed verification-needed-bionic verification-needed-focal verification-needed-groovy xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done verification-done-bionic verification-done-focal verification-done-groovy verification-done-xenial xenial
2021-04-06 18:04:32 Launchpad Janitor apt (Ubuntu Groovy): status Fix Committed Fix Released
2021-04-06 18:04:49 Brian Murray removed subscriber Ubuntu Stable Release Updates Team
2021-04-07 02:17:59 Launchpad Janitor apt (Ubuntu Bionic): status Fix Committed Fix Released
2021-04-07 02:21:00 Launchpad Janitor apt (Ubuntu Focal): status Fix Committed Fix Released
2022-05-06 08:22:56 Timo Aaltonen apt (Ubuntu Focal): status Fix Released Fix Committed
2022-05-06 08:22:59 Timo Aaltonen bug added subscriber Ubuntu Stable Release Updates Team
2022-05-06 08:23:03 Timo Aaltonen tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done verification-done-bionic verification-done-focal verification-done-groovy verification-done-xenial xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-bionic verification-done-groovy verification-done-xenial verification-needed verification-needed-focal xenial
2022-05-06 08:23:30 Timo Aaltonen apt (Ubuntu Focal): status Fix Committed Fix Released
2022-05-06 08:23:49 Timo Aaltonen tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-bionic verification-done-groovy verification-done-xenial verification-needed verification-needed-focal xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done verification-done-bionic verification-done-focal verification-done-groovy verification-done-xenial xenial
2022-05-06 08:27:30 Timo Aaltonen apt (Ubuntu Bionic): status Fix Released Fix Committed
2022-05-06 08:27:37 Timo Aaltonen tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done verification-done-bionic verification-done-focal verification-done-groovy verification-done-xenial xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-focal verification-done-groovy verification-done-xenial verification-needed verification-needed-bionic xenial
2022-05-06 08:28:29 Timo Aaltonen apt (Ubuntu Bionic): status Fix Committed Fix Released
2022-05-06 08:28:40 Timo Aaltonen tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-focal verification-done-groovy verification-done-xenial verification-needed verification-needed-bionic xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done verification-done-bionic verification-done-focal verification-done-groovy verification-done-xenial xenial
2022-08-08 08:51:25 Łukasz Zemczak apt (Ubuntu Bionic): status Fix Released Fix Committed
2022-08-08 08:51:36 Łukasz Zemczak tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done verification-done-bionic verification-done-focal verification-done-groovy verification-done-xenial xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-focal verification-done-groovy verification-done-xenial verification-needed verification-needed-bionic xenial
2022-08-08 20:08:31 Jarno Suni tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-focal verification-done-groovy verification-done-xenial verification-needed verification-needed-bionic xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-focal verification-done-groovy verification-done-xenial verification-failed-bionic verification-needed xenial
2022-09-14 05:20:50 Chris Halse Rogers tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-focal verification-done-groovy verification-done-xenial verification-failed-bionic verification-needed xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-focal verification-done-groovy verification-done-xenial verification-needed verification-needed-bionic xenial
2022-09-17 13:59:01 Jarno Suni tags amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-focal verification-done-groovy verification-done-xenial verification-needed verification-needed-bionic xenial amd64 apport-bug fr-747 kernel-autoremove seg sts verification-done-bionic verification-done-focal verification-done-groovy verification-done-xenial verification-needed xenial
2023-04-12 06:58:38 Launchpad Janitor apt (Ubuntu Bionic): status Fix Committed Fix Released