Activity log for bug #1969734

Date Who What changed Old value New value Message
2022-04-21 06:48:22 Ernst Sjöstrand bug added bug
2022-04-21 06:48:50 Ernst Sjöstrand bug watch added https://gitlab.gnome.org/GNOME/NetworkManager-openconnect/-/issues/63
2022-04-21 06:48:50 Ernst Sjöstrand bug task added network-manager-openconnect
2022-05-03 00:45:35 Launchpad Janitor network-manager-openconnect (Ubuntu): status New Confirmed
2022-05-03 00:47:19 pd5rm bug added subscriber pd5rm
2022-05-03 06:30:24 dwmw2 bug task added openconnect (Ubuntu)
2022-05-20 16:07:23 Bug Watch Updater network-manager-openconnect: status Unknown Fix Released
2022-05-27 11:53:09 Launchpad Janitor openconnect (Ubuntu): status New Confirmed
2022-05-30 12:53:12 Elfranne bug added subscriber Elfranne
2022-06-09 08:54:24 Ernst Sjöstrand description openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit.
2022-06-09 08:57:38 Ernst Sjöstrand attachment added openconnect_8.20-1_8.20-1ubuntu1.diff.gz https://bugs.launchpad.net/ubuntu/+source/network-manager-openconnect/+bug/1969734/+attachment/5595818/+files/openconnect_8.20-1_8.20-1ubuntu1.diff.gz
2022-06-09 09:10:29 Ernst Sjöstrand attachment added openconnect_8.20-1_8.20-1ubuntu1.diff.gz https://bugs.launchpad.net/ubuntu/+source/network-manager-openconnect/+bug/1969734/+attachment/5595819/+files/openconnect_8.20-1_8.20-1ubuntu1.diff.gz
2022-06-09 09:37:39 Ernst Sjöstrand attachment removed openconnect_8.20-1_8.20-1ubuntu1.diff.gz https://bugs.launchpad.net/ubuntu/+source/network-manager-openconnect/+bug/1969734/+attachment/5595818/+files/openconnect_8.20-1_8.20-1ubuntu1.diff.gz
2022-06-09 09:38:23 Ernst Sjöstrand description This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 1.2.6: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit.
2022-06-09 09:45:57 Ernst Sjöstrand description This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 1.2.6: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] * Users with a common GlobalProtect serverside configuration will not be able to connect. * This is caused by an backwards incompatible change in openconnect between openconnect and network-manager-openconnect * The debdiff fixes it by reverting the backwards incompatible change. [Test Plan] * You need a GlobalProtect server to test it, so perhaps we can collect reports from affected users. * This follows upstreams fixes only. [Where problems could occur] * WIP [Other Info] * WIP
2022-06-09 09:48:25 Ernst Sjöstrand description This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] * Users with a common GlobalProtect serverside configuration will not be able to connect. * This is caused by an backwards incompatible change in openconnect between openconnect and network-manager-openconnect * The debdiff fixes it by reverting the backwards incompatible change. [Test Plan] * You need a GlobalProtect server to test it, so perhaps we can collect reports from affected users. * This follows upstreams fixes only. [Where problems could occur] * WIP [Other Info] * WIP This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact]  * Users with a common GlobalProtect serverside configuration will not be able    to connect.  * This is caused by an backwards incompatible change in openconnect between    openconnect and network-manager-openconnect  * The debdiff fixes it by reverting the backwards incompatible change. [Test Plan]  * You need a GlobalProtect server to test it, so perhaps we can collect reports    from affected users.  * This follows upstreams fixes only. [Where problems could occur]  * WIP [Other Info] * There is no Debian release with this combination of versions so we can't import the fix from there.  * WIP
2022-06-09 10:50:30 Ernst Sjöstrand openconnect (Ubuntu): status Confirmed In Progress
2022-06-10 08:10:11 Ernst Sjöstrand bug added subscriber Ubuntu Sponsors Team
2022-06-21 22:31:55 Reuben Castelino bug added subscriber Reuben Castelino
2022-07-12 04:05:50 Ernst Sjöstrand bug added subscriber MOTU
2022-07-25 10:23:59 Juha Vainikka bug added subscriber Juha Vainikka
2022-08-01 15:07:43 Luís Infante da Câmara attachment added openconnect_8.20-1_8.20-1ubuntu1.debdiff https://bugs.launchpad.net/ubuntu/+source/openconnect/+bug/1969734/+attachment/5606291/+files/openconnect_8.20-1_8.20-1ubuntu1.debdiff
2022-08-01 15:37:56 Luís Infante da Câmara openconnect (Ubuntu): status In Progress New
2022-08-01 15:40:27 Luís Infante da Câmara network-manager-openconnect (Ubuntu): status Confirmed Invalid
2022-08-01 15:40:39 Luís Infante da Câmara network-manager-openconnect (Ubuntu): status Invalid Confirmed
2022-08-01 15:47:43 Steve Langasek network-manager-openconnect (Ubuntu): importance Undecided High
2022-08-01 15:49:35 Luís Infante da Câmara bug added subscriber Luís Cunha dos Reis Infante da Câmara
2022-08-02 08:08:49 Łukasz Zemczak nominated for series Ubuntu Jammy
2022-08-02 08:08:49 Łukasz Zemczak bug task added openconnect (Ubuntu Jammy)
2022-08-02 08:08:49 Łukasz Zemczak bug task added network-manager-openconnect (Ubuntu Jammy)
2022-08-02 08:09:40 Łukasz Zemczak openconnect (Ubuntu): status New Fix Released
2022-08-02 08:09:43 Łukasz Zemczak openconnect (Ubuntu Jammy): status New Incomplete
2022-08-05 21:01:29 Luís Infante da Câmara description This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact]  * Users with a common GlobalProtect serverside configuration will not be able    to connect.  * This is caused by an backwards incompatible change in openconnect between    openconnect and network-manager-openconnect  * The debdiff fixes it by reverting the backwards incompatible change. [Test Plan]  * You need a GlobalProtect server to test it, so perhaps we can collect reports    from affected users.  * This follows upstreams fixes only. [Where problems could occur]  * WIP [Other Info] * There is no Debian release with this combination of versions so we can't import the fix from there.  * WIP This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] Users with a common GlobalProtect serverside configuration will not be able to connect.  * This is caused by an backwards incompatible change in openconnect between    openconnect and network-manager-openconnect, that adds the ability for NetworkManager to override the server-provided configuration for split VPN.  * The debdiff fixes it by reverting the backwards incompatible change. [Test Plan] A GlobalProtect server is needed to test it, so perhaps we can collect reports from affected users. This follows upstream fixes only. [Where problems could occur] Other packages in the Ubuntu archive can depend on the feature, potentially causing regressions, or have other regressions due to the change. [Other Info] There is no Debian release with this combination of versions so we can't import the fix from there.
2022-08-05 21:01:54 Luís Infante da Câmara description This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] Users with a common GlobalProtect serverside configuration will not be able to connect.  * This is caused by an backwards incompatible change in openconnect between    openconnect and network-manager-openconnect, that adds the ability for NetworkManager to override the server-provided configuration for split VPN.  * The debdiff fixes it by reverting the backwards incompatible change. [Test Plan] A GlobalProtect server is needed to test it, so perhaps we can collect reports from affected users. This follows upstream fixes only. [Where problems could occur] Other packages in the Ubuntu archive can depend on the feature, potentially causing regressions, or have other regressions due to the change. [Other Info] There is no Debian release with this combination of versions so we can't import the fix from there. This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] Users with a common GlobalProtect serverside configuration will not be able to connect. This is caused by an backwards incompatible change in openconnect between openconnect and network-manager-openconnect, that adds the ability for NetworkManager to override the server-provided configuration for split VPN. The debdiff fixes it by reverting this change. [Test Plan] A GlobalProtect server is needed to test it, so perhaps we can collect reports from affected users. This follows upstream fixes only. [Where problems could occur] Other packages in the Ubuntu archive can depend on the feature, potentially causing regressions, or have other regressions due to the change. [Other Info] There is no Debian release with this combination of versions so we can't import the fix from there.
2022-08-05 21:41:01 Brian Murray removed subscriber Ubuntu Sponsors Team
2022-08-06 09:01:03 Luís Infante da Câmara openconnect (Ubuntu Jammy): status Incomplete Confirmed
2022-08-09 12:51:34 Luís Infante da Câmara openconnect (Ubuntu Jammy): status Confirmed In Progress
2022-08-09 12:51:37 Luís Infante da Câmara network-manager-openconnect (Ubuntu Jammy): status New Confirmed
2022-08-12 06:32:58 Ernst Sjöstrand bug watch added https://bugzilla.redhat.com/show_bug.cgi?id=2094338
2022-08-12 06:32:58 Ernst Sjöstrand bug task added fedora
2022-08-19 23:28:29 Steve Langasek openconnect (Ubuntu Jammy): status In Progress Incomplete
2022-08-26 09:05:14 Gundy bug added subscriber Gundy
2023-03-22 21:51:57 Lucas Campa bug added subscriber Lucas Campa
2023-05-12 08:01:42 Ubay Dorta Guerra bug added subscriber Ubay Dorta Guerra
2023-05-31 11:39:30 Bug Watch Updater fedora: status Unknown Won't Fix
2023-05-31 11:39:30 Bug Watch Updater fedora: importance Unknown High
2023-05-31 12:18:20 Ubuntu Foundations Team Bug Bot tags jammy jammy patch
2023-05-31 12:18:26 Ubuntu Foundations Team Bug Bot bug added subscriber Ubuntu Sponsors
2023-06-05 17:18:29 Steve Langasek removed subscriber Ubuntu Sponsors
2023-09-01 11:31:58 Luís Infante da Câmara description This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] Users with a common GlobalProtect serverside configuration will not be able to connect. This is caused by an backwards incompatible change in openconnect between openconnect and network-manager-openconnect, that adds the ability for NetworkManager to override the server-provided configuration for split VPN. The debdiff fixes it by reverting this change. [Test Plan] A GlobalProtect server is needed to test it, so perhaps we can collect reports from affected users. This follows upstream fixes only. [Where problems could occur] Other packages in the Ubuntu archive can depend on the feature, potentially causing regressions, or have other regressions due to the change. [Other Info] There is no Debian release with this combination of versions so we can't import the fix from there. This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] Users with a common GlobalProtect serverside configuration will not be able to connect. This is caused by an backwards incompatible change in openconnect between openconnect and network-manager-openconnect, that adds the ability for NetworkManager to override the server-provided configuration for split VPN. The debdiff fixes it by reverting this change. [Test Plan] A GlobalProtect server is needed to test it, so perhaps we can collect reports from affected users. This follows upstream fixes only. [Where problems could occur] Other packages in the Ubuntu archive can depend on the feature, potentially causing regressions, or have other regressions due to the change. However, this is extremely unlikely as the feature was introduced in the Ubuntu archive on 21 February 2022, that is only 3 days before Debian Import Freeze for Ubuntu 22.04 (24 February 2022). It is also possible that third-party software (outside of the Ubuntu archive) depends on the feature. However, the feature only affects GlobalProtect VPNs with the common server-side configuration mentioned above, where NetworkManager-openconnect is unusable due to the feature, and was reverted shortly thereafter in release 9.01, released on 29 April. Therefore, it is unlikely that such software is using the feature, even if the software in question is a workaround for this bug. [Other Info] There is no Debian release with this combination of versions so we can't import the fix from there.
2023-09-01 11:32:02 Luís Infante da Câmara openconnect (Ubuntu Jammy): status Incomplete Confirmed
2023-09-01 18:33:04 Luís Infante da Câmara network-manager-openconnect (Ubuntu): status Confirmed Fix Released
2023-09-01 18:33:55 Luís Infante da Câmara bug added subscriber Ubuntu Sponsors
2023-09-05 14:23:49 Lukas Märdian removed subscriber Ubuntu Sponsors
2023-09-05 15:43:06 Ubuntu Archive Robot bug added subscriber Lukas Märdian
2023-09-07 13:45:44 Robie Basak openconnect (Ubuntu Jammy): status Confirmed Incomplete
2023-09-08 09:23:05 Luís Infante da Câmara description This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] Users with a common GlobalProtect serverside configuration will not be able to connect. This is caused by an backwards incompatible change in openconnect between openconnect and network-manager-openconnect, that adds the ability for NetworkManager to override the server-provided configuration for split VPN. The debdiff fixes it by reverting this change. [Test Plan] A GlobalProtect server is needed to test it, so perhaps we can collect reports from affected users. This follows upstream fixes only. [Where problems could occur] Other packages in the Ubuntu archive can depend on the feature, potentially causing regressions, or have other regressions due to the change. However, this is extremely unlikely as the feature was introduced in the Ubuntu archive on 21 February 2022, that is only 3 days before Debian Import Freeze for Ubuntu 22.04 (24 February 2022). It is also possible that third-party software (outside of the Ubuntu archive) depends on the feature. However, the feature only affects GlobalProtect VPNs with the common server-side configuration mentioned above, where NetworkManager-openconnect is unusable due to the feature, and was reverted shortly thereafter in release 9.01, released on 29 April. Therefore, it is unlikely that such software is using the feature, even if the software in question is a workaround for this bug. [Other Info] There is no Debian release with this combination of versions so we can't import the fix from there. This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] Users with a common GlobalProtect serverside configuration will not be able to connect. This is caused by an backwards incompatible change in openconnect between openconnect and network-manager-openconnect, that adds the ability for NetworkManager to override the server-provided configuration for split VPN. The debdiff fixes it by reverting this change. [Test Plan] A GlobalProtect server is needed to test it, so perhaps we can collect reports from affected users. This follows upstream fixes only. [Where problems could occur] Other packages in the Ubuntu archive can depend on the feature, potentially causing regressions, or have other regressions due to the change. However, this is extremely unlikely as the feature was introduced in the Ubuntu archive on 21 February 2022, that is only 3 days before Debian Import Freeze for Ubuntu 22.04 (24 February 2022). It is also possible that third-party software (outside of the Ubuntu archive) depends on the feature. However, the feature only affects GlobalProtect VPNs with the common server-side configuration mentioned above, where NetworkManager-openconnect is unusable due to the feature, and was reverted shortly thereafter in release 9.01, released on 29 April. Therefore, it is unlikely that such software is using the feature, even if the software in question is a workaround for this bug. It is also possible that users have configured their systems in a way that depends on this feature. However, this is extremely unlikely. Several users have commented on this bug that they can connect to GlobalProtect VPNs with this common server-side configuration using openconnect directly or connman, and they are not relying on the feature. The only way that I see that a workaround could use the feature is to detect if the feature is present, to check if the workaround is needed. [Other Info] There is no Debian release with this combination of versions so we can't import the fix from there.
2023-09-08 09:23:13 Luís Infante da Câmara openconnect (Ubuntu Jammy): status Incomplete Confirmed
2023-09-08 09:33:21 Luís Infante da Câmara description This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] Users with a common GlobalProtect serverside configuration will not be able to connect. This is caused by an backwards incompatible change in openconnect between openconnect and network-manager-openconnect, that adds the ability for NetworkManager to override the server-provided configuration for split VPN. The debdiff fixes it by reverting this change. [Test Plan] A GlobalProtect server is needed to test it, so perhaps we can collect reports from affected users. This follows upstream fixes only. [Where problems could occur] Other packages in the Ubuntu archive can depend on the feature, potentially causing regressions, or have other regressions due to the change. However, this is extremely unlikely as the feature was introduced in the Ubuntu archive on 21 February 2022, that is only 3 days before Debian Import Freeze for Ubuntu 22.04 (24 February 2022). It is also possible that third-party software (outside of the Ubuntu archive) depends on the feature. However, the feature only affects GlobalProtect VPNs with the common server-side configuration mentioned above, where NetworkManager-openconnect is unusable due to the feature, and was reverted shortly thereafter in release 9.01, released on 29 April. Therefore, it is unlikely that such software is using the feature, even if the software in question is a workaround for this bug. It is also possible that users have configured their systems in a way that depends on this feature. However, this is extremely unlikely. Several users have commented on this bug that they can connect to GlobalProtect VPNs with this common server-side configuration using openconnect directly or connman, and they are not relying on the feature. The only way that I see that a workaround could use the feature is to detect if the feature is present, to check if the workaround is needed. [Other Info] There is no Debian release with this combination of versions so we can't import the fix from there. This bug only affects the specific combination of network-manager-openconnect and openconnect that ended up in Jammy. openconnect 8.20 breaks compatibility with NetworkManager-openconnect 8.20: "As of openconnect 8.20, INTERNAL_IPx_NETMASK can be set to 0.0.0.0 and /0 and this causes network manager to fail with a bad IP configuration. This happens because 0.0.0.0/0 is set as a split route, but rewritten to be used as netmask instead. If we detect this we force a /32 or /128 (IPv6) netmask prefix and avoid setting the CONFIG_NEVER_DEFAULT options." This commit was reverted because the upstream devs intention is to always be backwards compatible. Later the feature was implemented again in another way. So the best way forward for Jammy is to revert the openconnect commit. Working on making an SRU from this... [Impact] Users with a common GlobalProtect serverside configuration will not be able to connect. This is caused by an backwards incompatible change in openconnect between openconnect and network-manager-openconnect, that adds the ability for NetworkManager to override the server-provided configuration for split VPN. The debdiff fixes it by reverting this change. [Test Plan] A GlobalProtect server is needed to test it, so perhaps we can collect reports from affected users. This follows upstream fixes only. [Where problems could occur] Other packages in the Ubuntu archive can depend on the feature, potentially causing regressions, or have other regressions due to the change. However, this is extremely unlikely as the feature was introduced in the Ubuntu archive on 21 February 2022, that is only 3 days before Debian Import Freeze for Ubuntu 22.04 (24 February 2022). It is also possible that third-party software (outside of the Ubuntu archive) depends on the feature. However, the feature only affects GlobalProtect VPNs with the common server-side configuration mentioned above, where NetworkManager-openconnect is unusable due to the feature, and was reverted shortly thereafter in release 9.01, released on 29 April. Therefore, it is unlikely that such software is using the feature, even if the software in question is a workaround for this bug. It is also possible that users have configured their systems in a way that depends on this feature. However, this is extremely unlikely. Several users have commented on this bug that they can connect to GlobalProtect VPNs with this common server-side configuration using openconnect directly, and they are not relying on the feature. The only way that I see that a workaround could use the feature is to detect if the feature is present, to check if the workaround is needed. [Other Info] There is no Debian release with this combination of versions so we can't import the fix from there.