diff options
Diffstat (limited to 'sys-cluster')
-rw-r--r-- | sys-cluster/nova/ChangeLog | 11 | ||||
-rw-r--r-- | sys-cluster/nova/Manifest | 34 | ||||
-rw-r--r-- | sys-cluster/nova/files/nova-folsom-4-CVE-2013-2096.patch | 115 | ||||
-rw-r--r-- | sys-cluster/nova/files/nova-grizzly-1-CVE-2013-2096.patch | 96 | ||||
-rw-r--r-- | sys-cluster/nova/nova-2012.2.4-r2.ebuild (renamed from sys-cluster/nova/nova-2012.2.4-r1.ebuild) | 3 | ||||
-rw-r--r-- | sys-cluster/nova/nova-2013.1.1-r2.ebuild (renamed from sys-cluster/nova/nova-2013.1.1-r1.ebuild) | 3 |
6 files changed, 243 insertions, 19 deletions
diff --git a/sys-cluster/nova/ChangeLog b/sys-cluster/nova/ChangeLog index a6ccc993c552..7722c6cc6b15 100644 --- a/sys-cluster/nova/ChangeLog +++ b/sys-cluster/nova/ChangeLog @@ -1,6 +1,15 @@ # ChangeLog for sys-cluster/nova # Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-cluster/nova/ChangeLog,v 1.12 2013/05/16 01:11:03 prometheanfire Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-cluster/nova/ChangeLog,v 1.13 2013/05/17 14:57:48 prometheanfire Exp $ + +*nova-2013.1.1-r2 (17 May 2013) +*nova-2012.2.4-r2 (17 May 2013) + + 17 May 2013; Matthew Thode <prometheanfire@gentoo.org> + +files/nova-folsom-4-CVE-2013-2096.patch, + +files/nova-grizzly-1-CVE-2013-2096.patch, +nova-2012.2.4-r2.ebuild, + +nova-2013.1.1-r2.ebuild, -nova-2012.2.4-r1.ebuild, -nova-2013.1.1-r1.ebuild: + fix for CVE-2013-2096 for both grizzly and folsom *nova-2013.1.1-r1 (16 May 2013) diff --git a/sys-cluster/nova/Manifest b/sys-cluster/nova/Manifest index a46e8504dc52..54a9275669a8 100644 --- a/sys-cluster/nova/Manifest +++ b/sys-cluster/nova/Manifest @@ -2,27 +2,29 @@ Hash: SHA256 AUX nova-folsom-4-CVE-2013-2030.patch 1303 SHA256 55ee950de12d27420762b99514a56075bcaf866eb4352dfc038a56eaa2f458f9 SHA512 1dade2e76f559fed97be0259ab1bf16404ee86fcd2039f1e4df78ecf0ddc9cd2ccd8cbb557f4194bc949bc2d9634abef4939f1fbd564ee73def997ce759f6dc3 WHIRLPOOL 45cef89069302b3d73da205600201620115364a5e4d9dc7c850073aed03baff3a731126308ab2ba75d16677d7e32cd17d780640aa8571a753bf797ae664924d1 +AUX nova-folsom-4-CVE-2013-2096.patch 4545 SHA256 b7203f3d380b3d545259060872933e38d40a53b1e9081ab8b93f623fb2a30115 SHA512 f97c4330f4cd8433b150390f22194e86fccf50ecd9300f1b3692e07e3a8b53ee4ec844f191ea28a75298535c66f11aed77c6cb8fb8624b382a793d05e683bc68 WHIRLPOOL 4460bf65d8bffe03f8a4518a99f81f86f6c2f11ce8c6d1ce6ff03ce836da247dc6c8bed73e875a3b47427970291a10d6f34be5b056c4c7fef505ca2bab0b18ed +AUX nova-grizzly-1-CVE-2013-2096.patch 4019 SHA256 d20b89067fb63f4d37ebc5c258841c3d18bd9e4e59c455f247f8df1a25973be6 SHA512 e4b80eaf8260765534d1a69c1c3883c794e611ac17acf299443b519c09503f0f063bc2ea1b090e1519e30ef3afa84253ce0e2603a764001556e52c6b09bfc814 WHIRLPOOL 44215c9e48d06976ba372421b5de29083a72172f1f02a84649eecd1dff675ecbdde9be69851ca10fe194346ad750e900c1dafa0ea4be8799c4bf055126bd18e7 DIST nova-2012.2.4.tar.gz 6286004 SHA256 883a44282514b484a1187c07875834b9c4648555bf20002aceb1d6731ebd0252 SHA512 c05705c7802035232921e7ca9cdcea05571f4771dae573f9364b740553e470d8e4b4e832bf04120c089bad48a75b8493921eefeb28383f70620495a935ad6ec3 WHIRLPOOL 9e8c56b1a66f15f5f6218413e1cd518a0e73f371baea774023a11ad38abccae3e172ec0894fd77f59848685d1993451499916b94c62289d16f57470005e7c123 DIST nova-2013.1.1.tar.gz 5739118 SHA256 a6bde22f911af202d65a94ee167db567220855e397afac3aeff797f2b225c51c SHA512 b1e65493ed7ea4843dbde1d6afd829fccec0e30c91a996d18c7846aa53fcb663264d4aa4a207f9cce5c7bdb1b342e40928b4f9cbae0467a95d5b515c61655e9e WHIRLPOOL cf032d26a4111336e251755d79f088601032205cd2e63ebd0667fc7b1826f7e6ff664346806434ce01a0a5b4cd44d00d41f98bb45aede5704911fa65f870bac5 -EBUILD nova-2012.2.4-r1.ebuild 2232 SHA256 f00a417aa1af208c849ebff94e077754520324006aef6db14d5d591183182896 SHA512 45d43ffb9f85d22b3a66f3e2985fcf9dfe04509cc8e4802e9f81fa5dadd10268f55a1c7d199b0fe183429a9d0be5649436e6e108f6102e8485e53053d5432792 WHIRLPOOL a26c9fe3fb48fed115aa84f5008536e888fb72653ea4a65d741e326e89bb6879cf578b65371b2ca5383e04410cd5dee6b327683917ee8b416fc19ef8cebf09fc -EBUILD nova-2013.1.1-r1.ebuild 2595 SHA256 72e3a6b23ec1c2c9af3d602960c250708676908cdf410d843cf5aacb27265433 SHA512 a75012e9626d431987d2b83c2b17f2e9aefd1bcc11d6b18de30d89124deb7cbd7e0e52ac33bd86788b55470e93724337c9f768a96e4f265db5b5b3625665d7b3 WHIRLPOOL b86b5eb531057b3f08e5a852333aedeb1e667fc87897224a11dd240344b88f7e4658471ac4f377c65bf633d623b83c396d66f96ab6f9853cc9d795b310861c18 +EBUILD nova-2012.2.4-r2.ebuild 2281 SHA256 373cc5fc31dcd86a31ba1c7e20e5b41463183e557ad514453cb5e1b2e5804f40 SHA512 29242c5343385ac6e99519553ac8a0759b068e03c12557123f4ebafd850533b39fe97baa27e59439c9cb7babc8e92e3e67579a2ac40ae4f8f87e8c4ddda3573a WHIRLPOOL d434f6d0cf0b2856c9a2f32fa877453e44bfc34b5ec6bbeb67fc6ddc77ebbf48b1dbc748a72de99ddc3b0342313af4348632267a7b8db11bcaa83e520c71281b +EBUILD nova-2013.1.1-r2.ebuild 2645 SHA256 899ffed8a9b482d31307182fa0fcf1ec0ef0d7d724d6ba6f325d501f4939de53 SHA512 ba642d42977f7d575e469456b95ccb43a5fb1a5cbf58073bee0dd8ea54e91e2574ee4a7c6c727ae17e36df526f3d5fc9b70476932757381fc4e2957703d9e0a9 WHIRLPOOL 7b8e82879478fa2b5e67eff2e826ec5d97ee2e1be390abc3426d4e34730b4e269a06b14a8937ea7a87b7df4e85d5eee211757c213e279df2a14f75340930b8c2 EBUILD nova-9999.ebuild 2543 SHA256 fba439b8bc02341f3ca6bb827f89cd001b4b60fd913d097dcacc2c2af7e434e9 SHA512 4d50e966b8e092c12634a15c734b38bd83a5552fdb30eeb55d4b8875bac2b3b0c0a03fcc4f122660fe47e49d29827b486e499a0f9fd55b663951980c6be4e150 WHIRLPOOL 5a6239b221ee07ca51f57938f627e290d232c088e13842fb87fab5c596ff88ee3f79a055185c1806a4583df80ffa75c61dc9d98db474ca9dc67e448de83a40c3 -MISC ChangeLog 2783 SHA256 b51063720d7e25a369d651c40b6e3e78228dae5eb74d2a96435f0104b6c223c4 SHA512 d53cdf935a622847e586a44e228b693f254480688021aa70e6a8725a6c86d5d7e57ec34a7d1fda256ac00123dd2a42efa02b15af9f5a0eef9e61011c08cc8b7d WHIRLPOOL c76360a7639625704c78da01fa1f5a7d7c8aa5b73729e133256bc66f4899ec76cdae9db67f7873483f43febbae4a6f1353508ad9b2ad9c51ad45b22dd4003a86 +MISC ChangeLog 3153 SHA256 c896fde2e3cdc5ecad255986b458ce0a98b969e47b618135517ef97a0b4b0fe4 SHA512 d25a1c316963c1c18d1d017add3cad5b5f32787843e31a69360630f8993597ae0e385ed083feaeebeba20422554a358208f6ec03da6d3c84df9c07d6f024623a WHIRLPOOL a23af1f916ce925b3136d4f9b236cb2337f8fe6de8464e3202af283b66f728ef152d3b3b96ae9a1ef682e9a80de224f74646d0197ae6215868ba70302597cb1d MISC metadata.xml 407 SHA256 87ac581ad3af018ee16b2c5a8dbc98553ad93fc48bf5cfd62a6f929353049e77 SHA512 4ae00a6fc5411c1795249864317143787b31cb068fb1508f8a1455fd6194254961cca80256e0b437dc131560126cdf5a59d98a5a5064ac49c6e43c1651718a4a WHIRLPOOL 52b178c072593baea26fa3d7e9c06aac003d1a828ffa98de712306f60eeddba92271bc6061d7224a76ac35fa3c1da33213983e998160acf92a6d7027b284bcc0 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) -iQIcBAEBCAAGBQJRlDJrAAoJECRx6z5ArFrDZ7MP/2F2hfBg6Gg7P0IXWEASUf5A -U6CSL8BIrGNXHH+7UtgA1zKLYaj8mf1YX+FjMFVJoTKXG9JpcP3D32NxEZmGaBEI -Wd3mKt9c7QdzbAERupFnM8o+Ols3rSVzj3mFqq9MceBvQHLCrRD2pwbW3frS7WvZ -pDoAXzSwZwr5/islvncaZReyrdCO3seagHcpN//3CPNlq3Muqf8gM9gQMpGfP0r7 -Rt8yux+E9FE3LzkIzRY2B59Bq0+5z4NLX2jpAwPLZwihgQplwL/kG+fiYr9/Jo51 -efROhBzkMp2lTEyVVVlVDVojWZn8clpa79vaNb8h9s3nxvmCD/38EaaI/rlMGWaR -qE5z3wDdMGc+EfDswH9JH+J9X7aRiZHIXi7PuV5Io+LtkL2wgyAzsceVnI9BdpOb -RRVpj82IxO2ZdvaLC7Pa9xfo4L6bE+vd3d138ZbJGoGAU+7PJro9trbGtsoEYhYG -mmdDwZrdvVWzHRSSVgpIRk5Aq9C64qxENHYnQvHDqa+938kGsMPU4taFaQwTR+P9 -aCEDB+HD4Jjnqp5ANQgYs3Sn+NrbbSH/n4+U9l5Xfg9mZUnAzx/wcVD7usomYOaV -VQpmUQiKsk2FGtvPXWykvrWnYrsn8QcQvytJlXf0V6xuKiTDER+HSdljj+XkzQOz -Rf4w1E84qSW9i2CjUxqW -=bFbC +iQIcBAEBCAAGBQJRlkWuAAoJECRx6z5ArFrDtcAQAMyFPJl6xjY7Ng4k1jRCxnI7 +n23C9hX6GdsFbwa2J4/JqGjwiD1Ci0tRtCuc0+es8lGOsGre/VHPJiPu1V/iGNzY +XD0mmLGkv3IZ5msJy5LhXdMEHqFPCRNVVPsMwPrOszz4vahs4RB5FTPcx/xsWT2a +fEtx9okJA9AIIgS3penN5lzfNRAji8st29TXLqdHTXCRimOfEZgtSoVdu2hOTAe1 +tPpquM7Bg6RIROS3GpG12uAzBnumkpw+5wdGBfvCyZGjL3OJ9FgrFjkG3fX2pIPo +6PNQaXVuJiK0m5l/AiH+Z2YZON55TsZvLicm2urQCZAnLXfp1NA8fNDC5HaLdccW +2fVEPPg/dS8DDPwr4pk2VmviavafvjyG1cUlOlsukcX4lrp3aTEr//CPbV2tUAlF +2CcnRLmuH6+cATfpYgEZhpKEccMiA2l4hy5FMQKGaTN8M5HamnTH5u2h9A/4ykl2 +4ObvFZ8VDC+XzdjgwYVduVnGm6KU4R76r0ZrhDCZ4srzTxm0wyuTWGwOPGKghK9h +xL6cTYC+NNVViGRgDjK6uqEyX6OoF/lhNIqVsrs6amGVF08yL3egZY56Anb4CP+n +iIdG/ee3hf1E7mD7Std+dk5Si0Ie4dBOQkBzrNLqzmyIvbfFcTHXcOmhG4pVCqNO +5f87Rowcu9Inm58p+x6X +=Mt1P -----END PGP SIGNATURE----- diff --git a/sys-cluster/nova/files/nova-folsom-4-CVE-2013-2096.patch b/sys-cluster/nova/files/nova-folsom-4-CVE-2013-2096.patch new file mode 100644 index 000000000000..304a61f9d20f --- /dev/null +++ b/sys-cluster/nova/files/nova-folsom-4-CVE-2013-2096.patch @@ -0,0 +1,115 @@ +From 6740c4141ea1152529b82cbf6e5b808eaba912e7 Mon Sep 17 00:00:00 2001 +From: Chet Burgess <cfb@metacloud.com> +Date: Thu, 9 May 2013 09:57:28 +0000 +Subject: [PATCH] Check QCOW2 image size during root disk creation + +glance can only tell us the size of the file, not the virtual +size of the QCOW2. As such we need to check the virtual size of +the image once its cached and ensure it's <= to the flavor's +root disk size. + +Change-Id: I833467284126557eb598b8350a84e10c06292fa9 +Fixes: bug 1177830 +(cherry picked from commit 44a8aba1d5da87d54db48079103fdef946666d80) +--- + nova/tests/test_imagebackend.py | 18 ++++++++++++++++++ + nova/virt/libvirt/imagebackend.py | 12 ++++++++++++ + 2 files changed, 30 insertions(+) + +diff --git a/nova/tests/test_imagebackend.py b/nova/tests/test_imagebackend.py +index f0bb718..da14f20 100644 +--- a/nova/tests/test_imagebackend.py ++++ b/nova/tests/test_imagebackend.py +@@ -17,6 +17,7 @@ + + import os + ++from nova import exception + from nova import flags + from nova import test + from nova.tests import fake_libvirt_utils +@@ -190,7 +191,10 @@ class Qcow2TestCase(_ImageTestCase): + fn = self.prepare_mocks() + fn(target=self.TEMPLATE_PATH) + self.mox.StubOutWithMock(os.path, 'exists') ++ self.mox.StubOutWithMock(imagebackend.disk, 'get_disk_size') + os.path.exists(self.QCOW2_BASE).AndReturn(False) ++ imagebackend.disk.get_disk_size(self.TEMPLATE_PATH ++ ).AndReturn(self.SIZE) + imagebackend.libvirt_utils.copy_image(self.TEMPLATE_PATH, + self.QCOW2_BASE) + imagebackend.disk.extend(self.QCOW2_BASE, self.SIZE) +@@ -203,11 +207,25 @@ class Qcow2TestCase(_ImageTestCase): + + self.mox.VerifyAll() + ++ def test_create_image_too_small(self): ++ self.mox.StubOutWithMock(imagebackend.disk, 'get_disk_size') ++ imagebackend.disk.get_disk_size(self.TEMPLATE_PATH ++ ).AndReturn(self.SIZE) ++ self.mox.ReplayAll() ++ ++ image = self.image_class(self.INSTANCE, self.NAME) ++ self.assertRaises(exception.ImageTooLarge, image.create_image, None, ++ self.TEMPLATE_PATH, 1) ++ self.mox.VerifyAll() ++ + def test_create_image_with_size_template_exists(self): + fn = self.prepare_mocks() + fn(target=self.TEMPLATE_PATH) + self.mox.StubOutWithMock(os.path, 'exists') ++ self.mox.StubOutWithMock(imagebackend.disk, 'get_disk_size') + os.path.exists(self.QCOW2_BASE).AndReturn(True) ++ imagebackend.disk.get_disk_size(self.TEMPLATE_PATH ++ ).AndReturn(self.SIZE) + imagebackend.libvirt_utils.create_cow_image(self.QCOW2_BASE, + self.PATH) + self.mox.ReplayAll() +diff --git a/nova/virt/libvirt/imagebackend.py b/nova/virt/libvirt/imagebackend.py +index 0f2f044..5e7023e 100644 +--- a/nova/virt/libvirt/imagebackend.py ++++ b/nova/virt/libvirt/imagebackend.py +@@ -19,14 +19,17 @@ import abc + import contextlib + import os + ++from nova import exception + from nova import flags + from nova.openstack.common import cfg + from nova.openstack.common import excutils ++from nova.openstack.common import log as logging + from nova import utils + from nova.virt.disk import api as disk + from nova.virt.libvirt import config + from nova.virt.libvirt import utils as libvirt_utils + ++ + __imagebackend_opts = [ + cfg.StrOpt('libvirt_images_type', + default='default', +@@ -46,6 +49,8 @@ __imagebackend_opts = [ + FLAGS = flags.FLAGS + FLAGS.register_opts(__imagebackend_opts) + ++LOG = logging.getLogger(__name__) ++ + + class Image(object): + __metaclass__ = abc.ABCMeta +@@ -170,6 +175,13 @@ class Qcow2(Image): + disk.extend(qcow2_base, size) + libvirt_utils.create_cow_image(qcow2_base, target) + ++ # NOTE(cfb): Having a flavor that sets the root size to 0 and having ++ # nova effectively ignore that size and use the size of the ++ # image is considered a feature at this time, not a bug. ++ if size and size < disk.get_disk_size(base): ++ LOG.error('%s virtual size larger than flavor root disk size %s' % ++ (base, size)) ++ raise exception.ImageTooLarge() + prepare_template(target=base, *args, **kwargs) + with utils.remove_path_on_error(self.path): + copy_qcow2_image(base, self.path, size) +-- +1.8.1.5 + diff --git a/sys-cluster/nova/files/nova-grizzly-1-CVE-2013-2096.patch b/sys-cluster/nova/files/nova-grizzly-1-CVE-2013-2096.patch new file mode 100644 index 000000000000..5067ca97d77f --- /dev/null +++ b/sys-cluster/nova/files/nova-grizzly-1-CVE-2013-2096.patch @@ -0,0 +1,96 @@ +From a4fc0c800502338e4530cad910efb64a5483e1ea Mon Sep 17 00:00:00 2001 +From: Chet Burgess <cfb@metacloud.com> +Date: Thu, 9 May 2013 09:57:28 +0000 +Subject: [PATCH] Check QCOW2 image size during root disk creation + +glance can only tell us the size of the file, not the virtual +size of the QCOW2. As such we need to check the virtual size of +the image once its cached and ensure it's <= to the flavor's +root disk size. + +Change-Id: I833467284126557eb598b8350a84e10c06292fa9 +Fixes: bug 1177830 +(cherry picked from commit 44a8aba1d5da87d54db48079103fdef946666d80) +--- + nova/tests/test_imagebackend.py | 21 +++++++++++++++++++++ + nova/virt/libvirt/imagebackend.py | 8 ++++++++ + 2 files changed, 29 insertions(+) + +diff --git a/nova/tests/test_imagebackend.py b/nova/tests/test_imagebackend.py +index d571bbf..4ec36da 100644 +--- a/nova/tests/test_imagebackend.py ++++ b/nova/tests/test_imagebackend.py +@@ -20,6 +20,7 @@ import os + import fixtures + from oslo.config import cfg + ++from nova import exception + from nova.openstack.common import uuidutils + from nova import test + from nova.tests import fake_libvirt_utils +@@ -253,9 +254,12 @@ class Qcow2TestCase(_ImageTestCase, test.TestCase): + fn = self.prepare_mocks() + fn(target=self.TEMPLATE_PATH) + self.mox.StubOutWithMock(os.path, 'exists') ++ self.mox.StubOutWithMock(imagebackend.disk, 'get_disk_size') + if self.OLD_STYLE_INSTANCE_PATH: + os.path.exists(self.OLD_STYLE_INSTANCE_PATH).AndReturn(False) + os.path.exists(self.TEMPLATE_PATH).AndReturn(False) ++ imagebackend.disk.get_disk_size(self.TEMPLATE_PATH ++ ).AndReturn(self.SIZE) + os.path.exists(self.PATH).AndReturn(False) + imagebackend.libvirt_utils.create_cow_image(self.TEMPLATE_PATH, + self.PATH) +@@ -267,6 +271,23 @@ class Qcow2TestCase(_ImageTestCase, test.TestCase): + + self.mox.VerifyAll() + ++ def test_create_image_too_small(self): ++ fn = self.prepare_mocks() ++ fn(target=self.TEMPLATE_PATH) ++ self.mox.StubOutWithMock(os.path, 'exists') ++ self.mox.StubOutWithMock(imagebackend.disk, 'get_disk_size') ++ if self.OLD_STYLE_INSTANCE_PATH: ++ os.path.exists(self.OLD_STYLE_INSTANCE_PATH).AndReturn(False) ++ os.path.exists(self.TEMPLATE_PATH).AndReturn(False) ++ imagebackend.disk.get_disk_size(self.TEMPLATE_PATH ++ ).AndReturn(self.SIZE) ++ self.mox.ReplayAll() ++ ++ image = self.image_class(self.INSTANCE, self.NAME) ++ self.assertRaises(exception.ImageTooLarge, image.create_image, fn, ++ self.TEMPLATE_PATH, 1) ++ self.mox.VerifyAll() ++ + + class LvmTestCase(_ImageTestCase, test.TestCase): + VG = 'FakeVG' +diff --git a/nova/virt/libvirt/imagebackend.py b/nova/virt/libvirt/imagebackend.py +index b6b1b88..2ca71cc 100755 +--- a/nova/virt/libvirt/imagebackend.py ++++ b/nova/virt/libvirt/imagebackend.py +@@ -21,6 +21,7 @@ import os + + from oslo.config import cfg + ++from nova import exception + from nova.openstack.common import excutils + from nova.openstack.common import fileutils + from nova.openstack.common import lockutils +@@ -255,6 +256,13 @@ class Qcow2(Image): + + if not os.path.exists(base): + prepare_template(target=base, *args, **kwargs) ++ # NOTE(cfb): Having a flavor that sets the root size to 0 and having ++ # nova effectively ignore that size and use the size of the ++ # image is considered a feature at this time, not a bug. ++ if size and size < disk.get_disk_size(base): ++ LOG.error('%s virtual size larger than flavor root disk size %s' % ++ (base, size)) ++ raise exception.ImageTooLarge() + if not os.path.exists(self.path): + with utils.remove_path_on_error(self.path): + copy_qcow2_image(base, self.path, size) +-- +1.8.1.5 + diff --git a/sys-cluster/nova/nova-2012.2.4-r1.ebuild b/sys-cluster/nova/nova-2012.2.4-r2.ebuild index 27086453c574..4fc43413aaaa 100644 --- a/sys-cluster/nova/nova-2012.2.4-r1.ebuild +++ b/sys-cluster/nova/nova-2012.2.4-r2.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2013 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-cluster/nova/nova-2012.2.4-r1.ebuild,v 1.1 2013/05/10 04:11:00 prometheanfire Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-cluster/nova/nova-2012.2.4-r2.ebuild,v 1.1 2013/05/17 14:57:48 prometheanfire Exp $ EAPI=5 PYTHON_COMPAT=( python2_7 ) @@ -45,6 +45,7 @@ RDEPEND="=dev-python/amqplib-0.6.1 PATCHES=( "${FILESDIR}/nova-folsom-4-CVE-2013-2030.patch" + "${FILESDIR}/nova-folsom-4-CVE-2013-2096.patch" ) python_install() { diff --git a/sys-cluster/nova/nova-2013.1.1-r1.ebuild b/sys-cluster/nova/nova-2013.1.1-r2.ebuild index 848dec859c56..951e1e2a61a6 100644 --- a/sys-cluster/nova/nova-2013.1.1-r1.ebuild +++ b/sys-cluster/nova/nova-2013.1.1-r2.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2013 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-cluster/nova/nova-2013.1.1-r1.ebuild,v 1.1 2013/05/16 01:11:03 prometheanfire Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-cluster/nova/nova-2013.1.1-r2.ebuild,v 1.1 2013/05/17 14:57:48 prometheanfire Exp $ EAPI=5 PYTHON_COMPAT=( python2_7 ) @@ -53,6 +53,7 @@ RDEPEND=">=dev-python/amqplib-0.6.1[${PYTHON_USEDEP}] virtual/python-argparse[${PYTHON_USEDEP}]" PATCHES=( + "${FILESDIR}/nova-grizzly-1-CVE-2013-2096.patch" ) python_install() { |