UbuntuUpdates.org

Package "nova"

Name: nova

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • OpenStack Compute - API frontend
  • OpenStack Compute - common files
  • OpenStack Compute - compute node base
  • OpenStack Compute - compute node (KVM)

Latest version: 3:25.2.1-0ubuntu2.3
Release: jammy (22.04)
Level: security
Repository: main

Links



Other versions of "nova" in Jammy

Repository Area Version
base main 3:25.0.0-0ubuntu1
base universe 3:25.0.0-0ubuntu1
security universe 3:25.2.1-0ubuntu2.3
updates main 3:25.2.1-0ubuntu2.3
updates universe 3:25.2.1-0ubuntu2.3
proposed main 3:25.2.1-0ubuntu2.4
proposed universe 3:25.2.1-0ubuntu2.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3:25.2.1-0ubuntu2.3 2024-07-08 15:07:08 UTC

  nova (3:25.2.1-0ubuntu2.3) jammy-security; urgency=medium

  * SECURITY UPDATE: Arbitrary file access via custom QCOW2 external data
    (LP: #2059809)
    - debian/patches/CVE-2024-32498-pre1.patch: consolidate
      create_cow_image and create_image.
    - debian/patches/CVE-2024-32498-1.patch: reject qcow files with
      data-file attributes.
    - debian/patches/CVE-2024-32498-2.patch: check images with
      format_inspector for safety.
    - debian/patches/CVE-2024-32498-3.patch: additional qemu safety
      checking on base images.
    - debian/patches/CVE-2024-32498-4.patch: fix vmdk_allowed_types
      checking.
    - CVE-2024-32498

 -- Marc Deslauriers <email address hidden> Mon, 01 Jul 2024 14:08:34 -0400

Source diff to previous version
CVE-2024-32498 An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom

Version: 3:25.1.1-0ubuntu1.1 2023-07-24 15:07:06 UTC

  nova (3:25.1.1-0ubuntu1.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Unauthorized File Access (LP: #2021980)
    - debian/patches/CVE-2023-2088-1.patch: Use force=True for os-brick
      disconnect during delete.
    - debian/patches/CVE-2023-2088-2.patch: Enable use of service user
      token with admin context.
    - CVE-2023-2088

 -- Corey Bryant <email address hidden> Wed, 31 May 2023 16:43:41 -0400

Source diff to previous version
CVE-2023-2088 OSSA-2023-003: Unauthorized volume access through deleted volume attachments

Version: 3:25.1.0-0ubuntu2.2 2023-05-23 14:07:28 UTC

  nova (3:25.1.0-0ubuntu2.2) jammy-security; urgency=medium

  * SECURITY REGRESSION: Regressions in other projects (LP: #2020111)
    - debian/patches/series: Do not apply CVE-2023-2088.patch until
      patches are ready for all upstream OpenStack projects.
    - CVE-2023-2088

 -- Corey Bryant <email address hidden> Thu, 18 May 2023 11:34:52 -0400

Source diff to previous version
CVE-2023-2088 OSSA-2023-003: Unauthorized volume access through deleted volume attachments

Version: 3:25.1.0-0ubuntu2.1 2023-05-11 19:07:17 UTC

  nova (3:25.1.0-0ubuntu2.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Unauthorized File Access
    - debian/patches/CVE-2023-2088.patch: Use force=True for os-brick
      disconnect during delete.
    - CVE-2023-2088

 -- Corey Bryant <email address hidden> Thu, 04 May 2023 16:33:25 +0200

Source diff to previous version
CVE-2023-2088 OSSA-2023-003: Unauthorized volume access through deleted volume attachments

Version: 3:25.1.0-0ubuntu1 2023-01-31 15:07:16 UTC

  nova (3:25.1.0-0ubuntu1) jammy-security; urgency=medium

  * New stable point release for OpenStack Yoga (LP: #2004030).

 -- Corey Bryant <email address hidden> Fri, 27 Jan 2023 11:01:25 -0500

2004030 [SRU] yoga stable releases



About   -   Send Feedback to @ubuntu_updates