Debian Patches
Status for nova/2:32.1.0-7
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
|---|---|---|---|---|---|---|
| Install-missed-files.patch | Install missed files diff --git a/MANIFEST.in b/MANIFEST.in new file mode 100644 index 0000000..cf3032d |
Thomas Goirand <zigo@debian.org> | not-needed | 2021-09-28 | ||
| remove-svg-converter-from-doc-conf.py.patch | Remove sphinxcontrib.rsvgconverter from doc conf.py =================================================================== |
Thomas Goirand <zigo@debian.org> | not-needed | 2019-09-28 | ||
| Add-a-healtcheck-url.patch | Add a /healthcheck URL This is useful for operators to configure HAProxy and for monitoring. |
Thomas Goirand <zigo@debian.org> | no | 2020-04-30 | ||
| fix-exception.NovaException.patch | Fix exception.NovaException =================================================================== |
Thomas Goirand <zigo@debian.org> | no | 2024-11-19 | ||
| Fix-test_simple_tenant_usage-test.patch | Fix test_simple_tenant_usage test API policy test_simple_tenant_usage test does not send the start and end time in request's query string. In that case, API set the current time to both start and end times. So there is a chance that both start and end times can be the same, and Nova raises an error: - https://github.com/openstack/nova/blob/9e5ad07aeeb9f14eba37e2cdea9377e7af48ef88/nova/api/openstack/compute/simple_tenant_usage.py#L258 diff --git a/nova/tests/unit/policies/test_simple_tenant_usage.py b/nova/tests/unit/policies/test_simple_tenant_usage.py index f40dda1..a037d11 100644 |
Ghanshyam Maan <gmaan@ghanshyammann.com> | no | upstream, https://review.opendev.org/c/openstack/nova/+/966223 | 2025-11-06 | |
| fix-failing-timebased-tests.patch | Fixed failing timebased tests If the updates are made on the same second, these unit tests are failing. Adding a time.sleep(2) fixes it. =================================================================== |
Thomas Goirand <zigo@debian.org> | no | 2025-12-04 | ||
| testtools-2.8.2-TestMatchersInterface-is-removed.patch | Compat with testtools 2.8.2: TestMatchersInterface is removed | Thomas Goirand <zigo@debian.org> | no | debian | 2025-12-29 | |
| fix-test_validate_volume_mount_not_working.patch | Fix test_validate_volume_mount_not_working() | Thomas Goirand <zigo@debian.org> | yes | debian | 2025-12-29 | |
| cve-2026-24708-make-disk.extend-pass-format-to-qemu-img-2025.2.patch | CVE-2026-24708/OSSA-2026-002: Make disk.extend() pass format to qemu-img This fixes an instance of us passing a disk image to qemu-img for resize where we don't constrain the format. As has previously been identified, it is never safe to do that when the image itself is not trusted. In this case, an instance with a previously-raw disk image being used by imagebackend.Flat is susceptible to the user writing a qcow2 (or other) header to their disk causing the unconstrained qemu-img resize operation to interpret it as a qcow2 file. . Since Flat maintains the intended disk format in the disk.info file, and since we would have safety-checked images we got from glance, we should be able to trust the image.format specifier, which comes from driver_format in imagebackend, which is read from disk.info. Since only raw or qcow2 files should be resized anyway, we can further constrain it to those. . Notes: 1. qemu-img refuses to resize some types of VMDK files, but it may be able to resize others (there are many subformats). Technically, Flat will allow running an instance directly from a VMDK file, and so this change _could_ be limiting existing "unintentionally works" behavior. 2. This assumes that disk.info is correct, present, etc. The code to handle disk.info will regenerate the file if it's missing or unreadable by probing the image without a safety check, which would be unsafe. However, that is a much more sophisticated attack, requiring either access to the system to delete the file or an errant operator action in the first place. diff --git a/nova/tests/unit/virt/disk/test_api.py b/nova/tests/unit/virt/disk/test_api.py index 135558e145..4784227655 100644 |
Dan Smith <dansmith@redhat.com> | yes | upstream | upstream, https://review.opendev.org/c/openstack/nova/+/977101 | 2026-02-17 |
All known versions for source package 'nova'
- 2:32.1.0-7 (sid, forky)
- 2:31.0.0-6+deb13u2 (trixie-security, trixie-proposed-updates)
- 2:31.0.0-6+deb13u1 (trixie)
- 2:26.2.2-1~deb12u4 (bookworm-security, bookworm-proposed-updates)
- 2:26.2.2-1~deb12u3 (bookworm)
