Debian Package Tracker
Register | Log in
Subscribe

nova

Choose email to subscribe with

general
  • source: nova (main)
  • version: 2:22.0.1-1
  • maintainer: Debian OpenStack (DMD)
  • uploaders: Thomas Goirand [DMD] – Michal Arbet [DMD] – gustavo panizzo [DMD]
  • arch: all
  • std-ver: 4.4.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2014.1.3-11
  • oldstable: 2:14.0.0-4+deb9u1
  • old-sec: 2:14.0.0-4+deb9u1
  • stable: 2:18.1.0-6
  • testing: 2:22.0.0-3
  • unstable: 2:22.0.1-1
versioned links
  • 2014.1.3-11: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:14.0.0-4+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:18.1.0-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:22.0.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:22.0.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • nova-api
  • nova-common
  • nova-compute
  • nova-compute-ironic
  • nova-compute-kvm
  • nova-compute-lxc
  • nova-compute-qemu (1 bugs: 0, 1, 0, 0)
  • nova-conductor
  • nova-consoleproxy
  • nova-doc
  • nova-scheduler
  • nova-volume
  • python3-nova
action needed
1 security issue in sid high
There is 1 open security issue in sid.
1 important issue:
  • CVE-2015-9543: An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to NovaProxyRequestHandlerBase.new_websocket_client in console/websocketproxy.py.
Please fix it.
Created: 2020-02-19 Last update: 2021-01-19 20:00
1 security issue in bullseye high
There is 1 open security issue in bullseye.
1 important issue:
  • CVE-2015-9543: An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to NovaProxyRequestHandlerBase.new_websocket_client in console/websocketproxy.py.
Please fix it.
Created: 2020-08-22 Last update: 2021-01-19 20:00
Depends on packages which need a new maintainer normal
The packages that nova depends on which need a new maintainer are:
  • libcgroup (#823161)
    • Depends: cgroup-tools
  • pastescript (#740531)
    • Depends: python3-pastescript
  • sudo (#976244)
    • Depends: sudo
Created: 2019-11-22 Last update: 2021-01-22 10:06
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2020-08-25 Last update: 2021-01-22 08:07
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • nova-doc could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2021-01-22 07:01
4 ignored security issues in stretch low
There are 4 open security issues in stretch.
4 issues skipped by the security teams:
  • CVE-2015-9543: An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to NovaProxyRequestHandlerBase.new_websocket_client in console/websocketproxy.py.
  • CVE-2017-18191: An issue was discovered in OpenStack Nova 15.x through 15.1.0 and 16.x through 16.1.1. By detaching and reattaching an encrypted volume, an attacker may access the underlying raw volume and corrupt the LUKS header, resulting in a denial of service attack on the compute host. (The same code error also results in data loss, but that is not a vulnerability because the user loses their own data.) All Nova setups supporting encrypted volumes are affected.
  • CVE-2019-14433: An issue was discovered in OpenStack Nova before 17.0.12, 18.x before 18.2.2, and 19.x before 19.0.2. If an API request from an authenticated user ends in a fault condition due to an external exception, details of the underlying environment may be leaked in the response, and could include sensitive configuration or other data.
  • CVE-2020-17376: An issue was discovered in Guest.migrate in virt/libvirt/guest.py in OpenStack Nova before 19.3.1, 20.x before 20.3.1, and 21.0.0. By performing a soft reboot of an instance that has previously undergone live migration, a user may gain access to destination host devices that share the same paths as host devices previously referenced by the virtual machine on the source host. This can include block devices that map to different Cinder volumes at the destination than at the source. Only deployments allowing host-based connections (for instance, root and ephemeral devices) are affected.
Please fix them.
Created: 2018-02-20 Last update: 2021-01-19 20:00
3 ignored security issues in buster low
There are 3 open security issues in buster.
3 issues skipped by the security teams:
  • CVE-2015-9543: An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to NovaProxyRequestHandlerBase.new_websocket_client in console/websocketproxy.py.
  • CVE-2019-14433: An issue was discovered in OpenStack Nova before 17.0.12, 18.x before 18.2.2, and 19.x before 19.0.2. If an API request from an authenticated user ends in a fault condition due to an external exception, details of the underlying environment may be leaked in the response, and could include sensitive configuration or other data.
  • CVE-2020-17376: An issue was discovered in Guest.migrate in virt/libvirt/guest.py in OpenStack Nova before 19.3.1, 20.x before 20.3.1, and 21.0.0. By performing a soft reboot of an instance that has previously undergone live migration, a user may gain access to destination host devices that share the same paths as host devices previously referenced by the virtual machine on the source host. This can include block devices that map to different Cinder volumes at the destination than at the source. Only deployments allowing host-based connections (for instance, root and ephemeral devices) are affected.
Please fix them.
Created: 2019-08-07 Last update: 2021-01-19 20:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.5.1 instead of 4.4.1).
Created: 2020-01-21 Last update: 2021-01-19 19:05
testing migrations
  • excuses:
    • Migration status for nova (2:22.0.0-3 to 2:22.0.1-1): Waiting for test results, another package or too young (no action required now - check later)
    • Issues preventing migration:
    • Too young, only 3 of 5 days old
    • Additional info:
    • Piuparts tested OK - https://piuparts.debian.org/sid/source/n/nova.html
    • Not considered
news
[rss feed]
  • [2021-01-19] Accepted nova 2:22.0.1-1 (source) into unstable (Thomas Goirand)
  • [2021-01-09] nova 2:22.0.0-3 MIGRATED to testing (Debian testing watch)
  • [2021-01-04] Accepted nova 2:22.0.0-3 (source) into unstable (Thomas Goirand)
  • [2020-10-26] nova 2:22.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-10-26] nova 2:22.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-10-20] Accepted nova 2:22.0.0-2 (source) into unstable (Thomas Goirand)
  • [2020-10-17] Accepted nova 2:22.0.0-1 (source) into unstable (Thomas Goirand)
  • [2020-09-26] Accepted nova 2:22.0.0~rc1-1 (source) into experimental (Thomas Goirand)
  • [2020-09-01] nova 2:21.1.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-08-27] Accepted nova 2:21.1.0-2 (source) into unstable (Thomas Goirand)
  • [2020-08-27] Accepted nova 2:21.1.0-1 (source) into unstable (Thomas Goirand)
  • [2020-08-23] nova 2:21.0.0-3 MIGRATED to testing (Debian testing watch)
  • [2020-08-22] nova REMOVED from testing (Debian testing watch)
  • [2020-07-03] nova 2:21.0.0-3 MIGRATED to testing (Debian testing watch)
  • [2020-06-27] Accepted nova 2:21.0.0-3 (source) into unstable (Thomas Goirand)
  • [2020-05-29] nova 2:21.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-05-18] Accepted nova 2:21.0.0-2 (source) into unstable (Thomas Goirand)
  • [2020-05-13] Accepted nova 2:21.0.0-1 (source) into unstable (Thomas Goirand)
  • [2020-05-09] Accepted nova 2:21.0.0~rc2-1 (source) into unstable (Thomas Goirand)
  • [2020-04-26] Accepted nova 2:21.0.0~rc1-3 (source) into experimental (Thomas Goirand)
  • [2020-04-24] Accepted nova 2:21.0.0~rc1-2 (source) into experimental (Thomas Goirand)
  • [2020-04-24] Accepted nova 2:21.0.0~rc1-1 (source) into experimental (Thomas Goirand)
  • [2020-04-01] nova 2:20.1.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-03-26] Accepted nova 2:20.1.1-1 (source) into unstable (Thomas Goirand)
  • [2020-03-18] nova 2:20.0.0-5 MIGRATED to testing (Debian testing watch)
  • [2020-03-13] Accepted nova 2:20.0.0-5 (source) into unstable (Thomas Goirand)
  • [2020-03-13] Accepted nova 2:20.0.0-4 (source) into unstable (Thomas Goirand)
  • [2020-02-01] nova 2:20.0.0-3 MIGRATED to testing (Debian testing watch)
  • [2019-12-05] Accepted nova 2:20.0.0-3 (source) into unstable (Michal Arbet)
  • [2019-11-20] nova 2:20.0.0-2 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • buildd: logs, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (48, 99)
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3:22.0.1+git2020121010.3a6c1cbc3a-0ubuntu1
  • 40 bugs (3 patches)
  • patches for 3:22.0.1+git2020121010.3a6c1cbc3a-0ubuntu1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing