This commit contains changes from:
* https://github.com/ceph/ceph/pull/5430
rgw: url encode exposed bucket
Don't send the bucket name back without url encoding it.
* https://github.com/ceph/ceph/pull/4844
rgw: Do not enclose the Bucket header in quotes
HTTP headers don't have to be enclosed when it's a string.
The aforementioned commits help to prevent CVE-2015-5245
Closes-Bug: #
1520185
Change-Id: I934309ecce99628b6d1309658ee3506cc4153d64
+ceph (0.80.9-1~u14.04+mos1+mos6.1+1) mos6.1; urgency=hi
+
+ * Fix security vulnerability CVE-2015-5245
+ https://github.com/ceph/ceph/pull/5430
+
+ -- Denis Meltsaykin <dmeltsaykin@mirantis.com> Mon, 07 Dec 2015 20:19:12 +0300
+
ceph (0.80.9-1~u14.04+mos1) mos6.1; urgency=hi
* Fixing performance regression
virtualenv-never-download
modules.patch
+url_encode_exposed_bucket.patch
--- /dev/null
+diff -Nuar ceph-0.80.9/src/rgw/rgw_rest.cc ceph-0.80.9-WIP/src/rgw/rgw_rest.cc
+--- ceph-0.80.9/src/rgw/rgw_rest.cc 2015-04-09 00:30:46.000000000 +0300
++++ ceph-0.80.9-WIP/src/rgw/rgw_rest.cc 2015-12-07 22:16:13.100942762 +0300
+@@ -272,8 +272,11 @@
+ {
+ int expose_bucket = g_conf->rgw_expose_bucket;
+ if (expose_bucket) {
+- if (!s->bucket_name_str.empty())
+- s->cio->print("Bucket: \"%s\"\r\n", s->bucket_name_str.c_str());
++ if (!s->bucket_name_str.empty()){
++ string b;
++ url_encode(s->bucket_name_str, b);
++ s->cio->print("Bucket: %s\r\n", b.c_str());
++ }
+ }
+ }
+