diff --git a/releasenotes/source/newton.rst b/releasenotes/source/newton.rst index 389c336808e2..284a6800920f 100644 --- a/releasenotes/source/newton.rst +++ b/releasenotes/source/newton.rst @@ -16,9 +16,9 @@ Upgrade Notes - This release contains a schema migration for the ``nova_api`` database in order to address bug 1738094: - + https://bugs.launchpad.net/nova/+bug/1738094 - + The migration is optional and can be postponed if you have not been affected by the bug. The bug manifests itself through "Data too long for column 'spec'" database errors. @@ -38,10 +38,10 @@ Bug Fixes Similarly, rebuilding an instance on a host that is at capacity for vcpu, memory or disk could fail since the scheduler filters would treat it as a new build request even though the rebuild is not claiming *new* resources. - + Therefore this release contains a fix for those regressions in scheduling behavior on rebuild while maintaining the original fix for CVE-2017-16239. - + .. note:: The fix relies on a ``RUN_ON_REBUILD`` variable which is checked for all scheduler filters during a rebuild. The reasoning behind the value for that variable depends on each filter. If you have @@ -58,7 +58,7 @@ Bug Fixes bug is now fixed so that the ``force`` parameter can once again be specified during quota updates. There is no new microversion for this change since it is an admin-only API. - + .. _bug 1733886: https://bugs.launchpad.net/nova/+bug/1733886 @@ -75,14 +75,14 @@ Security Issues .. releasenotes/notes/bug-1664931-validate-image-rebuild-9c5b05a001c94a4d.yaml @ b'698b261a5a2a6c0f31ef5059046ef7196d5cba30' - `OSSA-2017-005`_: Nova Filter Scheduler bypass through rebuild action - + By rebuilding an instance, an authenticated user may be able to circumvent the FilterScheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using the FilterScheduler (or CachingScheduler) are affected. - + The fix is in the `nova-api` and `nova-conductor` services. - + .. _OSSA-2017-005: https://security.openstack.org/ossa/OSSA-2017-005.html @@ -102,7 +102,7 @@ Bug Fixes and running ``nova-manage cell_v2 simple_cell_setup`` or ``nova-manage cell_v2 map_cell0`` where the database connection is read from config and has special characters in the URL. - + .. _bug 1673613: https://launchpad.net/bugs/1673613 .. releasenotes/notes/bug-1691545-1acd6512effbdffb.yaml @ b'd6a628da62f810310ab1bdc2e04222d8010e7b62' @@ -112,7 +112,7 @@ Bug Fixes established. With this fix, objects related to database connections are cached in the API service and reused to prevent new connections being established for every communication with cell databases. - + .. _bug 1691545: https://bugs.launchpad.net/nova/+bug/1691545 .. releasenotes/notes/fix-default-cell0-db-connection-f9717053cc34778e.yaml @ b'f9a3c3fcff89828b7df45149c2d0ee188f439e46' @@ -168,7 +168,7 @@ Security Issues .. releasenotes/notes/bug-1673569-cve-2017-7214-2d7644b356015c93.yaml @ b'c2c91ce44592fc5dc2aacee1cf7f5b5cfd2e9a0a' - [CVE-2017-7214] Failed notification payload is dumped in logs with auth secrets - + * `Bug 1673569 `_ @@ -188,24 +188,24 @@ Known Issues `ivs`, `iovisor`, `midonet`, and `vrouter` virtual interface types Nova previously generated an empty path attribute to the script element (`