2017-03-10 22:07:39 |
Ryan Harper |
bug |
|
|
added bug |
2017-03-10 22:09:53 |
Ryan Harper |
attachment added |
|
ipv6_mtu.debdiff https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1671951/+attachment/4835554/+files/ipv6_mtu.debdiff |
|
2017-03-11 00:29:47 |
Ubuntu Foundations Team Bug Bot |
tags |
curtin maas netplan |
curtin maas netplan patch |
|
2017-03-11 00:29:54 |
Ubuntu Foundations Team Bug Bot |
bug |
|
|
added subscriber Ubuntu Sponsors Team |
2017-03-11 01:00:39 |
Brian Murray |
tags |
curtin maas netplan patch |
curtin maas netplan patch zesty |
|
2017-03-12 08:54:12 |
Mathew Hodson |
systemd (Ubuntu): importance |
Undecided |
Medium |
|
2017-03-14 01:05:13 |
Jay Vosburgh |
bug |
|
|
added subscriber Jay Vosburgh |
2017-03-14 15:47:29 |
Dan Streetman |
bug |
|
|
added subscriber Dan Streetman |
2017-03-28 18:30:44 |
Jon Grimm |
bug |
|
|
added subscriber Jon Grimm |
2017-08-09 18:12:38 |
Nish Aravamudan |
removed subscriber Ubuntu Sponsors Team |
|
|
|
2017-10-04 19:50:35 |
Ryan Harper |
branch linked |
|
lp:~raharper/curtin/trunk.vmtest-remove-bug-timers |
|
2017-10-05 15:47:33 |
Scott Moser |
systemd (Ubuntu): status |
New |
Confirmed |
|
2018-01-26 20:14:35 |
Mike Pontillo |
bug |
|
|
added subscriber Mike Pontillo |
2018-02-15 19:40:50 |
Francis Ginther |
tags |
curtin maas netplan patch zesty |
curtin id-5a6a5c89cfbc4063786d54f6 maas netplan patch zesty |
|
2018-03-09 08:43:12 |
Eric Desrochers |
bug |
|
|
added subscriber Eric Desrochers |
2018-08-16 12:24:39 |
Francis Ginther |
tags |
curtin id-5a6a5c89cfbc4063786d54f6 maas netplan patch zesty |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch zesty |
|
2018-08-29 13:33:34 |
Dimitri John Ledkov |
systemd (Ubuntu): status |
Confirmed |
Fix Released |
|
2018-08-29 13:33:43 |
Dimitri John Ledkov |
nominated for series |
|
Ubuntu Bionic |
|
2018-08-29 13:33:43 |
Dimitri John Ledkov |
bug task added |
|
systemd (Ubuntu Bionic) |
|
2018-09-28 13:59:17 |
Scott Moser |
attachment added |
|
console log of curtin vmtest amd64 533 https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1671951/+attachment/5194078/+files/curtin-vmtest-devel-amd64-533-console.log |
|
2018-09-28 14:27:21 |
Ryan Harper |
bug task added |
|
netplan.io (Ubuntu) |
|
2018-09-28 14:29:01 |
Ryan Harper |
bug task added |
|
cloud-init (Ubuntu) |
|
2018-09-28 14:59:46 |
Scott Moser |
cloud-init (Ubuntu): status |
New |
Confirmed |
|
2018-09-28 14:59:49 |
Scott Moser |
cloud-init (Ubuntu Bionic): status |
New |
Confirmed |
|
2018-10-05 14:16:29 |
Dimitri John Ledkov |
systemd (Ubuntu Bionic): status |
New |
In Progress |
|
2018-10-08 10:14:26 |
Dimitri John Ledkov |
description |
1) Zesty
2) systemd-232-19
3) I need to configure the IPV6 MTU for tunneling by adding an IPv6MTUBytes=1480 value in the .network file for an interface with an IPV6 static address in the [Network] section
4) networkd does not parse or read the value and does not apply this configuration to the interface.
Upstream has discussed this issue here:
https://github.com/systemd/systemd/pull/1533
But it's been closed in favor of only setting via RA.
However, we know of multiple use-case which are currently supported in
ifdupdown where we want to retain control over IPV6 MTU values outside
of PMTU Discovery configurations.
Some context from those discussions
>> Client systems that route their ipv6 packets to a 6in4 router also
>> have to have their ipv6 mtu lowered. They could lower their link mtu,
>> so their ipv6 packets are small enough, but that reduces performance
>> of their ipv4 network.
Yes. Anything that creates a PMTUD black hole can result in
situations where the higher header overhead of IPv6 will cause IPv4 to
pass but IPv6 traffic to be dropped.
One example here is egress from an ipsec tunnel wherein the next
hop MTU is too low for IPv6 datagrams to pass. Another is VM ->
whatever -> host bridge -> tunnel ingress. If the datagram cannot enter
the tunnel due to size, it is dropped, and an ICMP response uses the
tunnel address as a source, which may not be routable back to the
origin. This one is an issue with IPv4 as well, and is one case where
manually setting the IPv6 MTU lower than the (also manually set) device
MTU is of benefit.
In essence, any of these sort of cases that require an explicit
setting of the device MTU will likely require a setting of the IPv6 mtu
as well to account for its larger header overhead. |
= systemd =
[Impact]
* IPv6 traffic failing to send/receive due to incompatible/low MTU setting. Specifically, IPv6 traffic may have higher MTU requirements than IPv4 traffic and thus may need to be overridden and/or set to a higher value than IPv6 traffic.
[Test Case]
* Use IPv6MTUBytes= setting in a .network unit
* Restart systemd-network
* Check that there no error messages / warnings about not-recognizing this option
* Check that MTU bytes, is at least IPv6MTUBytes on the interface
[Regression Potential]
* This is a future compatible backport of an additional keyword not used by default. It may result in MTU change to a higher value, which should not cause loss of connectivity.
[Other Info]
* Original bug report below
= end of systemd =
1) Zesty
2) systemd-232-19
3) I need to configure the IPV6 MTU for tunneling by adding an IPv6MTUBytes=1480 value in the .network file for an interface with an IPV6 static address in the [Network] section
4) networkd does not parse or read the value and does not apply this configuration to the interface.
Upstream has discussed this issue here:
https://github.com/systemd/systemd/pull/1533
But it's been closed in favor of only setting via RA.
However, we know of multiple use-case which are currently supported in
ifdupdown where we want to retain control over IPV6 MTU values outside
of PMTU Discovery configurations.
Some context from those discussions
>> Client systems that route their ipv6 packets to a 6in4 router also
>> have to have their ipv6 mtu lowered. They could lower their link mtu,
>> so their ipv6 packets are small enough, but that reduces performance
>> of their ipv4 network.
Yes. Anything that creates a PMTUD black hole can result in
situations where the higher header overhead of IPv6 will cause IPv4 to
pass but IPv6 traffic to be dropped.
One example here is egress from an ipsec tunnel wherein the next
hop MTU is too low for IPv6 datagrams to pass. Another is VM ->
whatever -> host bridge -> tunnel ingress. If the datagram cannot enter
the tunnel due to size, it is dropped, and an ICMP response uses the
tunnel address as a source, which may not be routable back to the
origin. This one is an issue with IPv4 as well, and is one case where
manually setting the IPv6 MTU lower than the (also manually set) device
MTU is of benefit.
In essence, any of these sort of cases that require an explicit
setting of the device MTU will likely require a setting of the IPv6 mtu
as well to account for its larger header overhead. |
|
2018-11-19 14:02:50 |
Łukasz Zemczak |
systemd (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2018-11-19 14:02:53 |
Łukasz Zemczak |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2018-11-19 14:02:54 |
Łukasz Zemczak |
bug |
|
|
added subscriber SRU Verification |
2018-11-19 14:03:01 |
Łukasz Zemczak |
tags |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch zesty |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch verification-needed verification-needed-bionic zesty |
|
2018-12-04 12:16:52 |
Dimitri John Ledkov |
tags |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch verification-needed verification-needed-bionic zesty |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch verification-done verification-done-bionic zesty |
|
2019-04-08 15:07:42 |
Dan Streetman |
removed subscriber Dan Streetman |
|
|
|
2019-05-01 12:26:22 |
Francis Ginther |
tags |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch verification-done verification-done-bionic zesty |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 maas netplan patch verification-done verification-done-bionic zesty |
|
2019-08-20 18:07:49 |
Mathieu Trudel-Lapierre |
netplan.io (Ubuntu): status |
New |
In Progress |
|
2019-08-22 01:13:47 |
Launchpad Janitor |
netplan.io (Ubuntu): status |
In Progress |
Fix Released |
|
2019-08-27 16:20:19 |
Mathieu Trudel-Lapierre |
description |
= systemd =
[Impact]
* IPv6 traffic failing to send/receive due to incompatible/low MTU setting. Specifically, IPv6 traffic may have higher MTU requirements than IPv4 traffic and thus may need to be overridden and/or set to a higher value than IPv6 traffic.
[Test Case]
* Use IPv6MTUBytes= setting in a .network unit
* Restart systemd-network
* Check that there no error messages / warnings about not-recognizing this option
* Check that MTU bytes, is at least IPv6MTUBytes on the interface
[Regression Potential]
* This is a future compatible backport of an additional keyword not used by default. It may result in MTU change to a higher value, which should not cause loss of connectivity.
[Other Info]
* Original bug report below
= end of systemd =
1) Zesty
2) systemd-232-19
3) I need to configure the IPV6 MTU for tunneling by adding an IPv6MTUBytes=1480 value in the .network file for an interface with an IPV6 static address in the [Network] section
4) networkd does not parse or read the value and does not apply this configuration to the interface.
Upstream has discussed this issue here:
https://github.com/systemd/systemd/pull/1533
But it's been closed in favor of only setting via RA.
However, we know of multiple use-case which are currently supported in
ifdupdown where we want to retain control over IPV6 MTU values outside
of PMTU Discovery configurations.
Some context from those discussions
>> Client systems that route their ipv6 packets to a 6in4 router also
>> have to have their ipv6 mtu lowered. They could lower their link mtu,
>> so their ipv6 packets are small enough, but that reduces performance
>> of their ipv4 network.
Yes. Anything that creates a PMTUD black hole can result in
situations where the higher header overhead of IPv6 will cause IPv4 to
pass but IPv6 traffic to be dropped.
One example here is egress from an ipsec tunnel wherein the next
hop MTU is too low for IPv6 datagrams to pass. Another is VM ->
whatever -> host bridge -> tunnel ingress. If the datagram cannot enter
the tunnel due to size, it is dropped, and an ICMP response uses the
tunnel address as a source, which may not be routable back to the
origin. This one is an issue with IPv4 as well, and is one case where
manually setting the IPv6 MTU lower than the (also manually set) device
MTU is of benefit.
In essence, any of these sort of cases that require an explicit
setting of the device MTU will likely require a setting of the IPv6 mtu
as well to account for its larger header overhead. |
= netplan.io =
[Impact]
* IPv6 traffic failing to send/receive due to incompatible/low MTU setting. Specifically, IPv6 traffic may have higher MTU requirements than IPv4 traffic and thus may need to be overridden and/or set to a higher value than IPv6 traffic.
[Test Case]
* Apply a netplan configuration that specifices ipv6-mtu:
network:
version: 2
ethernets:
eth0:
dhcp4: true
dhcp6: true
ipv6-mtu: 6000
* Check that MTU bytes, is at least IPv6MTUBytes on the interface:
$ sysctl net.ipv6.conf.eth0.mtu
net.ipv6.conf.eth0.mtu = 6000
[Regression Potential]
* This is a future compatible backport of an additional keyword not used by default. It may result in MTU change to a higher value, which should not cause loss of connectivity.
[Other Info]
* Original bug report below
= end of netplan.io =
= systemd =
[Impact]
* IPv6 traffic failing to send/receive due to incompatible/low MTU setting. Specifically, IPv6 traffic may have higher MTU requirements than IPv4 traffic and thus may need to be overridden and/or set to a higher value than IPv6 traffic.
[Test Case]
* Use IPv6MTUBytes= setting in a .network unit
* Restart systemd-network
* Check that there no error messages / warnings about not-recognizing this option
* Check that MTU bytes, is at least IPv6MTUBytes on the interface
[Regression Potential]
* This is a future compatible backport of an additional keyword not used by default. It may result in MTU change to a higher value, which should not cause loss of connectivity.
[Other Info]
* Original bug report below
= end of systemd =
1) Zesty
2) systemd-232-19
3) I need to configure the IPV6 MTU for tunneling by adding an IPv6MTUBytes=1480 value in the .network file for an interface with an IPV6 static address in the [Network] section
4) networkd does not parse or read the value and does not apply this configuration to the interface.
Upstream has discussed this issue here:
https://github.com/systemd/systemd/pull/1533
But it's been closed in favor of only setting via RA.
However, we know of multiple use-case which are currently supported in
ifdupdown where we want to retain control over IPV6 MTU values outside
of PMTU Discovery configurations.
Some context from those discussions
>> Client systems that route their ipv6 packets to a 6in4 router also
>> have to have their ipv6 mtu lowered. They could lower their link mtu,
>> so their ipv6 packets are small enough, but that reduces performance
>> of their ipv4 network.
Yes. Anything that creates a PMTUD black hole can result in
situations where the higher header overhead of IPv6 will cause IPv4 to
pass but IPv6 traffic to be dropped.
One example here is egress from an ipsec tunnel wherein the next
hop MTU is too low for IPv6 datagrams to pass. Another is VM ->
whatever -> host bridge -> tunnel ingress. If the datagram cannot enter
the tunnel due to size, it is dropped, and an ICMP response uses the
tunnel address as a source, which may not be routable back to the
origin. This one is an issue with IPv4 as well, and is one case where
manually setting the IPv6 MTU lower than the (also manually set) device
MTU is of benefit.
In essence, any of these sort of cases that require an explicit
setting of the device MTU will likely require a setting of the IPv6 mtu
as well to account for its larger header overhead. |
|
2019-08-27 22:47:41 |
Brian Murray |
netplan.io (Ubuntu Bionic): status |
New |
Fix Committed |
|
2019-08-27 22:47:48 |
Brian Murray |
tags |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 maas netplan patch verification-done verification-done-bionic zesty |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 maas netplan patch verification-needed verification-needed-bionic zesty |
|
2019-08-30 12:40:28 |
Francis Ginther |
tags |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 maas netplan patch verification-needed verification-needed-bionic zesty |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-needed verification-needed-bionic zesty |
|
2019-09-30 13:33:14 |
Balint Reczey |
systemd (Ubuntu Bionic): status |
Fix Committed |
In Progress |
|
2019-09-30 13:33:18 |
Balint Reczey |
systemd (Ubuntu Bionic): assignee |
|
Balint Reczey (rbalint) |
|
2019-09-30 13:38:52 |
Balint Reczey |
bug |
|
|
added subscriber Balint Reczey |
2019-09-30 16:16:20 |
Dan Streetman |
bug |
|
|
added subscriber Dan Streetman |
2019-09-30 20:32:37 |
Steve Langasek |
systemd (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2019-10-02 16:25:06 |
Mathieu Trudel-Lapierre |
tags |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-needed verification-needed-bionic zesty |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-done-bionic |
|
2019-10-02 17:58:59 |
Mathieu Trudel-Lapierre |
tags |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-done-bionic |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-done-bionic verification-done-disco |
|
2019-10-02 21:51:22 |
Brian Murray |
nominated for series |
|
Ubuntu Disco |
|
2019-10-02 21:51:22 |
Brian Murray |
bug task added |
|
cloud-init (Ubuntu Disco) |
|
2019-10-02 21:51:22 |
Brian Murray |
bug task added |
|
systemd (Ubuntu Disco) |
|
2019-10-02 21:51:22 |
Brian Murray |
bug task added |
|
netplan.io (Ubuntu Disco) |
|
2019-10-02 21:51:45 |
Brian Murray |
netplan.io (Ubuntu Disco): status |
New |
Fix Committed |
|
2019-10-02 21:54:51 |
Launchpad Janitor |
netplan.io (Ubuntu Disco): status |
Fix Committed |
Fix Released |
|
2019-10-02 21:55:08 |
Launchpad Janitor |
netplan.io (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2019-10-02 21:55:28 |
Brian Murray |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2019-10-10 02:41:46 |
Launchpad Janitor |
systemd (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2019-10-25 17:23:32 |
Mathieu Trudel-Lapierre |
systemd (Ubuntu Bionic): status |
Fix Released |
Triaged |
|
2019-10-25 17:23:35 |
Mathieu Trudel-Lapierre |
systemd (Ubuntu Disco): status |
New |
Triaged |
|
2019-12-13 15:12:23 |
Dan Streetman |
nominated for series |
|
Ubuntu Focal |
|
2019-12-13 15:12:23 |
Dan Streetman |
bug task added |
|
cloud-init (Ubuntu Focal) |
|
2019-12-13 15:12:23 |
Dan Streetman |
bug task added |
|
systemd (Ubuntu Focal) |
|
2019-12-13 15:12:23 |
Dan Streetman |
bug task added |
|
netplan.io (Ubuntu Focal) |
|
2019-12-13 15:12:23 |
Dan Streetman |
nominated for series |
|
Ubuntu Eoan |
|
2019-12-13 15:12:23 |
Dan Streetman |
bug task added |
|
cloud-init (Ubuntu Eoan) |
|
2019-12-13 15:12:23 |
Dan Streetman |
bug task added |
|
systemd (Ubuntu Eoan) |
|
2019-12-13 15:12:23 |
Dan Streetman |
bug task added |
|
netplan.io (Ubuntu Eoan) |
|
2019-12-13 15:13:15 |
Dan Streetman |
bug watch added |
|
https://github.com/systemd/systemd/issues/13914 |
|
2019-12-13 15:13:15 |
Dan Streetman |
bug task added |
|
systemd |
|
2019-12-13 15:14:31 |
Dan Streetman |
systemd (Ubuntu Focal): status |
Fix Released |
In Progress |
|
2019-12-13 15:14:31 |
Dan Streetman |
systemd (Ubuntu Focal): assignee |
|
Dan Streetman (ddstreet) |
|
2019-12-13 15:14:44 |
Dan Streetman |
systemd (Ubuntu Eoan): status |
New |
In Progress |
|
2019-12-13 15:14:44 |
Dan Streetman |
systemd (Ubuntu Eoan): assignee |
|
Dan Streetman (ddstreet) |
|
2019-12-13 15:14:58 |
Dan Streetman |
systemd (Ubuntu Disco): status |
Triaged |
In Progress |
|
2019-12-13 15:14:58 |
Dan Streetman |
systemd (Ubuntu Disco): assignee |
|
Dan Streetman (ddstreet) |
|
2019-12-13 15:15:10 |
Dan Streetman |
systemd (Ubuntu Bionic): status |
Triaged |
In Progress |
|
2019-12-13 15:15:10 |
Dan Streetman |
systemd (Ubuntu Bionic): assignee |
Balint Reczey (rbalint) |
Dan Streetman (ddstreet) |
|
2019-12-13 15:15:38 |
Dan Streetman |
netplan.io (Ubuntu Eoan): status |
New |
Fix Released |
|
2019-12-13 15:20:30 |
Dan Streetman |
tags |
curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-done-bionic verification-done-disco |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-bionic verification-done-disco |
|
2019-12-13 19:10:03 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~ddstreet/ubuntu/+source/systemd/+git/systemd/+merge/376801 |
|
2020-01-14 13:05:45 |
Dan Streetman |
systemd (Ubuntu Disco): status |
In Progress |
Won't Fix |
|
2020-01-23 16:26:02 |
Launchpad Janitor |
systemd (Ubuntu Focal): status |
In Progress |
Fix Released |
|
2020-02-03 21:40:29 |
Steve Langasek |
systemd (Ubuntu Eoan): status |
In Progress |
Fix Committed |
|
2020-02-03 21:40:37 |
Steve Langasek |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2020-02-03 21:40:48 |
Steve Langasek |
tags |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-bionic verification-done-disco |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-bionic verification-done-disco verification-needed verification-needed-eoan |
|
2020-02-03 21:52:33 |
Steve Langasek |
systemd (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2020-02-03 21:52:49 |
Steve Langasek |
tags |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-bionic verification-done-disco verification-needed verification-needed-eoan |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-needed verification-needed-bionic verification-needed-eoan |
|
2020-02-05 14:24:25 |
Ryan Harper |
attachment added |
|
curtin vmtest logs for ipv6 mtu verification https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1671951/+attachment/5325665/+files/bug-1671951-curtin-vmtest-verification.tar.gz |
|
2020-02-05 14:36:28 |
Ryan Harper |
tags |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-needed verification-needed-bionic verification-needed-eoan |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-done-eoan verification-needed verification-needed-bionic |
|
2020-02-05 14:38:02 |
Ryan Harper |
tags |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-done-eoan verification-needed verification-needed-bionic |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-needed verification-needed-bionic verification-needed-eoan |
|
2020-02-05 16:29:38 |
Launchpad Janitor |
systemd (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2020-02-05 16:29:38 |
Launchpad Janitor |
cve linked |
|
2019-20386 |
|
2020-02-05 16:29:38 |
Launchpad Janitor |
cve linked |
|
2019-3843 |
|
2020-02-05 16:29:38 |
Launchpad Janitor |
cve linked |
|
2019-3844 |
|
2020-02-05 16:29:38 |
Launchpad Janitor |
cve linked |
|
2020-1712 |
|
2020-02-06 15:22:59 |
Dimitri John Ledkov |
systemd (Ubuntu Eoan): status |
Fix Committed |
In Progress |
|
2020-02-06 21:41:56 |
Steve Langasek |
systemd (Ubuntu Eoan): status |
In Progress |
Fix Committed |
|
2020-02-06 21:46:00 |
Steve Langasek |
systemd (Ubuntu Bionic): status |
Fix Released |
Fix Committed |
|
2020-02-07 22:30:42 |
Ryan Harper |
attachment added |
|
curtin vmtest logs for ipv6 mtu verification https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1671951/+attachment/5326389/+files/bug-1671951-curtin-vmtest-verification-v2.tar.gz |
|
2020-02-10 13:42:04 |
Dan Streetman |
tags |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-needed verification-needed-bionic verification-needed-eoan |
bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done verification-done-bionic verification-done-disco verification-done-eoan |
|
2020-02-17 09:35:40 |
Launchpad Janitor |
systemd (Ubuntu Eoan): status |
Fix Committed |
Fix Released |
|
2020-02-17 10:07:54 |
Launchpad Janitor |
systemd (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2020-07-02 19:56:15 |
Steve Langasek |
cloud-init (Ubuntu Disco): status |
New |
Won't Fix |
|
2020-07-10 13:54:31 |
Launchpad Janitor |
merge proposal linked |
|
https://code.launchpad.net/~paride/curtin/+git/curtin/+merge/387218 |
|
2022-05-05 01:19:07 |
Launchpad Janitor |
cloud-init (Ubuntu Eoan): status |
New |
Confirmed |
|