Version 30.0.0

nova

Cloud computing fabric controller

Install Instructions

pip install nova
Current Version Release Date October 02, 2024
Language Python
Package URL (purl) pkg:pip/nova@30.0.0

Find nova vulnerabilities in your supply chain.

Scan for Free

nova Vulnerabilities

Sort by
icon CVE (Latest)
  • icon CVE (Latest)
  • icon CVE (Oldest)
  • icon CVSS Score (Highest)
  • icon CVSS Score (Lowest)
CVE question mark icon CVSS Score question mark icon CWE(s) question mark icon EPSS Score question mark icon EPSS % question mark icon Impacted Versions
CVE-2013-2256 Medium 6 CWE-264 0.00238 0.62531
  • 30.0.0–30.0.0.0rc1
  • 29.0.0–29.2.0
  • 28.0.0–28.3.0
  • 27.0.0–27.5.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2013-4179 Medium 4.3 CWE-119 0.00537 0.77848
  • 30.0.0–30.0.0.0rc1
  • 29.0.0–29.2.0
  • 28.0.0–28.3.0
  • 27.0.0–27.5.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2014-3517 Medium 4.3 CWE-200 0.00308 0.70661
  • 30.0.0–30.0.0.0rc1
  • 29.0.0–29.2.0
  • 28.0.0–28.3.0
  • 27.0.0–27.5.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2014-3608 Low 2.7 CWE-399 0.00666 0.80286
  • 30.0.0–30.0.0.0rc1
  • 29.0.0–29.2.0
  • 28.0.0–28.3.0
  • 27.0.0–27.5.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2014-3708 Medium 4 CWE-399 0.00456 0.7594
  • 30.0.0–30.0.0.0rc1
  • 29.0.0–29.2.0
  • 28.0.0–28.3.0
  • 27.0.0–27.5.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2015-0259 Medium 5.1 CWE-345 0.00755 0.81629
  • 30.0.0–30.0.0.0rc1
  • 29.0.0–29.2.0
  • 28.0.0–28.3.0
  • 27.0.0–27.5.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2015-3280 Medium 6.8 CWE-399 0.00638 0.79747
  • 30.0.0–30.0.0.0rc1
  • 29.0.0–29.2.0
  • 28.0.0–28.3.0
  • 27.0.0–27.5.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2015-7713 Medium 5 CWE-254 0.00531 0.77719
  • 30.0.0–30.0.0.0rc1
  • 29.0.0–29.2.0
  • 28.0.0–28.3.0
  • 27.0.0–27.5.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2024-32498 Medium 6.5 CWE-552 0.0007 0.32057
  • 29.0.0–29.0.2
  • 28.0.0–28.1.0
  • 27.0.0–27.3.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2024-40767 Medium 6.5 CWE-552 0.00067 0.30982
  • 29.0.0–29.1.0
  • 28.0.0–28.2.0
  • 27.0.0–27.4.0
  • 26.0.0–26.3.0
  • 25.0.0–25.3.0
  • 24.0.0–24.2.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2022-47951 Medium 5.7 CWE-22 0.00261 0.66523
  • 25.0.0–25.0.1
  • 24.0.0–24.1.1
  • 23.0.0–23.2.2
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2022-37394 Low 3.3 CWE-400 0.00061 0.27511
  • 25.0.0–25.0.1
  • 24.0.0–24.1.1
  • 23.0.0–23.2.1
  • 22.0.0–22.4.0
  • 21.0.0–21.2.4
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2021-3654 Medium 6.1 CWE-601 0.89357 0.98865
  • 23.0.0–23.0.2
  • 22.0.0–22.2.2
  • 21.0.0–21.2.2
  • 20.0.0–20.6.1
  • 19.0.0–19.3.2
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2020-17376 High 8.3 CWE-611 0.0017 0.5509
  • 21.0.0
  • 20.0.0–20.3.0
  • 19.0.0–19.3.0
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2015-9543 Low 3.3 CWE-200 0.00045 0.17069
  • 20.0.0–20.0.1
  • 19.0.0–19.0.3
  • 18.0.2–18.3.0
  • 17.0.7–17.0.13
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2019-14433 Medium 6.5 CWE-200, CWE-209 0.00257 0.66115
  • 19.0.0–19.0.1
  • 18.0.2–18.2.1
  • 17.0.7–17.0.11
  • 16.1.6–16.1.8
  • 15.1.5
CVE-2017-17051 High 8.6 CWE-400 0.00647 0.79891
  • 15.1.5

nova Vulnerability Remediation Guidance

CVE Description Full list of Impacted Versions Fix
CVE-2024-40767 In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498. 27.0.0.0rc1, 29.1.0, 29.0.2, 29.0.0, 29.0.1, 27.4.0, 28.2.0, 28.1.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2024-32498 An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected. 27.0.0.0rc1, 29.0.2, 29.0.0, 29.0.1, 28.1.0, 26.3.0, 27.3.0, 26.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-47951 An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. 24.0.0.0rc1, 23.0.0.0rc1, 25.0.1, 25.0.0, 24.1.1, 24.1.0, 23.2.1, 23.2.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-37394 An issue was discovered in OpenStack Nova before 23.2.2, 24.x before 24.1.2, and 25.x before 25.0.2. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user may cause the compute service to fail to restart, resulting in a possible denial of service. Only Nova deployments configured with SR-IOV are affected. 23.0.0.0rc1, 25.0.1, 25.0.0, 24.1.1, 24.1.0, 23.2.1, 23.2.0, 22.4.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-3654 A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL. 22.2.0, 20.3.0, 19.2.0, 22.2.1, 21.1.1, 20.5.0, 21.2.0, 20.6.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-17376 An issue was discovered in Guest.migrate in virt/libvirt/guest.py in OpenStack Nova before 19.3.1, 20.x before 20.3.1, and 21.0.0. By performing a soft reboot of an instance that has previously undergone live migration, a user may gain access to destination host devices that share the same paths as host devices previously referenced by the virtual machine on the source host. This can include block devices that map to different Cinder volumes at the destination than at the source. Only deployments allowing host-based connections (for instance, root and ephemeral devices) are affected. 20.3.0, 19.2.0, 20.0.0, 18.1.0, 18.2.0, 20.2.0, 15.1.5, 20.1.1 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14433 An issue was discovered in OpenStack Nova before 17.0.12, 18.x before 18.2.2, and 19.x before 19.0.2. If an API request from an authenticated user ends in a fault condition due to an external exception, details of the underlying environment may be leaked in the response, and could include sensitive configuration or other data. 18.1.0, 18.2.0, 15.1.5, 16.1.8, 19.0.1, 19.0.0, 18.0.3, 18.2.1 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-17051 An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This regression was introduced with the fix for OSSA-2017-005 (CVE-2017-16239); however, only Nova stable/pike or later deployments with that fix applied and relying on the default FilterScheduler are affected. 15.1.5 Patch → NO_SAFE_VERSION
CVE-2015-9543 An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to NovaProxyRequestHandlerBase.new_websocket_client in console/websocketproxy.py. 20.0.0, 18.1.0, 18.2.0, 15.1.5, 16.1.8, 19.0.1, 19.0.0, 20.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-7713 OpenStack Compute (Nova) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) do not properly apply security group changes, which allows remote attackers to bypass intended restriction by leveraging an instance that was running when the change was made. 30.0.0, 30.0.0.0rc1, 29.0.0.0rc1, 28.0.0.0rc1, 29.2.0, 28.3.0, 27.5.0, 27.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3280 OpenStack Compute (nova) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) does not properly delete instances from compute nodes, which allows remote authenticated users to cause a denial of service (disk consumption) by deleting instances while in the resize state. 30.0.0, 30.0.0.0rc1, 29.0.0.0rc1, 28.0.0.0rc1, 29.2.0, 28.3.0, 27.5.0, 27.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-0259 OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage. 30.0.0, 30.0.0.0rc1, 29.0.0.0rc1, 28.0.0.0rc1, 29.2.0, 28.3.0, 27.5.0, 27.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3708 OpenStack Compute (Nova) before 2014.1.4 and 2014.2.x before 2014.2.1 allows remote authenticated users to cause a denial of service (CPU consumption) via an IP filter in a list active servers API request. 30.0.0, 30.0.0.0rc1, 29.0.0.0rc1, 28.0.0.0rc1, 29.2.0, 28.3.0, 27.5.0, 27.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3608 The VMWare driver in OpenStack Compute (Nova) before 2014.1.3 allows remote authenticated users to bypass the quota limit and cause a denial of service (resource consumption) by putting the VM into the rescue state, suspending it, which puts into an ERROR state, and then deleting the image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2573. 30.0.0, 30.0.0.0rc1, 29.0.0.0rc1, 28.0.0.0rc1, 29.2.0, 28.3.0, 27.5.0, 27.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3517 api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests. 30.0.0, 30.0.0.0rc1, 29.0.0.0rc1, 28.0.0.0rc1, 29.2.0, 28.3.0, 27.5.0, 27.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2013-4179 The security group extension in OpenStack Compute (Nova) Grizzly 2013.1.3, Havana before havana-3, and earlier allows remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack. NOTE: this issue is due to an incomplete fix for CVE-2013-1664. 30.0.0, 30.0.0.0rc1, 29.0.0.0rc1, 28.0.0.0rc1, 29.2.0, 28.3.0, 27.5.0, 27.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2013-2256 OpenStack Compute (Nova) before 2013.1.3 and Havana before havana-2 does not properly enforce the os-flavor-access:is_public property, which allows remote authenticated users to obtain sensitive information (flavor properties), boot arbitrary flavors, and possibly have other unspecified impacts by guessing the flavor id. 30.0.0, 30.0.0.0rc1, 29.0.0.0rc1, 28.0.0.0rc1, 29.2.0, 28.3.0, 27.5.0, 27.0.0.0rc1 (Show all) Patch → NO_SAFE_VERSION

Instantly see if these nova vulnerabilities affect your code.

Scan for Free

Dependencies

Packages using versions of nova affected by its vulnerabilities

Dependent Packages
Jinja2>=2.10
Paste>=2.0.2
PasteDeploy>=1.5.0
PrettyTable>=0.7.1
PyYAML>=5.1
Routes>=2.3.1
SQLAlchemy>=1.4.13
WebOb>=1.8.2
alembic>=1.5.0
castellan>=0.16.0
cryptography>=2.7
cursive>=0.2.1
decorator>=4.1.0
eventlet>=0.30.1
futurist>=1.8.0
greenlet>=0.4.15
iso8601>=0.1.11
jsonschema>=4.0.0
keystoneauth1>=3.16.0
keystonemiddleware>=4.20.0
lxml>=4.5.0
microversion-parse>=0.2.1
netaddr>=0.7.18
netifaces>=0.10.4
openstacksdk>=0.35.0
os-brick>=5.2
os-resource-classes>=1.1.0
os-service-types>=1.7.0
os-traits>=3.1.0
os-vif>=3.1.0
oslo.cache>=1.26.0
oslo.concurrency>=5.0.1
oslo.config>=8.6.0
oslo.context>=3.4.0
oslo.db>=10.0.0
oslo.i18n>=5.1.0
oslo.limit>=1.5.0
oslo.log>=4.6.1
oslo.messaging>=14.1.0
oslo.middleware>=3.31.0
oslo.policy>=4.4.0
oslo.privsep>=2.6.2
oslo.reports>=1.18.0
oslo.rootwrap>=5.15.0
oslo.serialization>=4.2.0
oslo.service>=2.8.0
oslo.upgradecheck>=1.3.0
oslo.utils>=7.3.0
oslo.versionedobjects>=1.35.0
paramiko>=2.7.1
pbr>=5.8.0
psutil>=3.2.2
python-cinderclient>=4.0.1
python-dateutil>=2.7.0
python-glanceclient>=2.8.0
python-neutronclient>=7.1.0
requests>=2.25.1
retrying>=1.3.3
rfc3986>=1.2.0
stevedore>=1.20.0
tooz>=1.58.0
websockify>=0.9.0
osprofiler>=1.4.0; extra == "osprofiler"
PyMySQL>=0.8.0; extra == "test"
bandit>=1.1.0; extra == "test"
coverage>=4.4.1; extra == "test"
ddt>=1.2.1; extra == "test"
fixtures>=3.0.0; extra == "test"
gabbi>=1.35.0; extra == "test"
hacking==6.1.0; extra == "test"
oslotest>=3.8.0; extra == "test"
osprofiler>=1.4.0; extra == "test"
psycopg2-binary>=2.8; extra == "test"
python-barbicanclient>=4.5.2; extra == "test"
requests-mock>=1.2.0; extra == "test"
stestr>=2.0.0; extra == "test"
testresources>=2.0.0; extra == "test"
testscenarios>=0.4; extra == "test"
testtools>=2.5.0; extra == "test"
wsgi-intercept>=1.7.0; extra == "test"
oslo.vmware>=3.6.0; extra == "vmware"
zVMCloudConnector>=1.3.0; sys_platform != "win32" and extra == "zvm"