Current Series Release Notes¶
16.0.0.0rc1-14¶
Upgrade Notes¶
A new
cyborg-dbsync online_data_migrationssubcommand backfills theproject_idcolumn on existing accelerator requests (ARQs). Expected operator order:Upgrade the
cyborg-dbsyncpackage (and related shared code) socyborg-dbsync upgradecan apply pending schema migrations.Run
cyborg-dbsync online_data_migrationsto backfillproject_idon existing ARQ rows using Nova instance data.Upgrade Cyborg services, starting with conductor and API, then agents.
The cyborg-conductor service also heals remaining NULL
project_idvalues on startup as a safety net.Nova
GET /servers/{id}calls for this migration pass microversion2.82explicitly so thetenant_idfield shape used for backfill stays consistent.
Nova must be configured with
[service_user] send_service_user_token = truefor Cyborg to accept bound-ARQ operations (bind, unbind, delete). This is the same requirement as for Cinder volume attachments since OSSA-2023-003.Cyborg now defaults
[keystone_authtoken] service_token_roles_requiredtotrueso that keystonemiddleware validates the service token roles. Operators who have not already set this should ensure the service user has theservicerole in Keystone.
Cyborg API policies now declare
scope_types=['project']and reject Keystone system-scoped tokens via oslo.policy scope enforcement. Keep[oslo_policy] enforce_scope=True. Disabling it weakens project isolation and is discouraged; prefer custom policy rules if you need different access behavior.
Security Issues¶
This issue is assigned CVE-2026-40214.
Fixed a cross-tenant access control vulnerability in accelerator request (ARQ) management. The
project_idfield was never populated on ARQ records, which meant non-admin users could list, view, and delete ARQs belonging to other projects. This could lead to information disclosure (leaking instance UUIDs across tenants) and denial of service (deleting another tenant’s ARQ prevents their instance from restarting).ARQs are now scoped to the requesting project. Non-admin users can only see and manage their own project’s ARQs.
Additionally, binding, unbinding, and deleting bound ARQs now require a service token. Only Nova, identified by a valid service token with the
servicerole, may set or clear theinstance_uuidon an ARQ or delete a bound ARQ. This prevents users from directly manipulating ARQs that Nova is managing, following the same pattern as the Cinder OSSA-2023-003 fix.
This issue is assigned CVE-2026-40213.
Replaced permissive
rule:allowdefaults withrule:admin_apion device, deployable, and attribute API policies so authenticated low-privilege users cannot read or change hardware topology and management data without the admin role. System-scoped tokens are not supported by Cyborg. Deployments that relied on the old defaults must grantadminor define custom policy rules for these APIs.