diff --git a/6000-CVE-2018-16889.patch b/6000-CVE-2018-16889.patch deleted file mode 100644 index bf3f117e233b7ef391773e0790af5841de8aca06..0000000000000000000000000000000000000000 --- a/6000-CVE-2018-16889.patch +++ /dev/null @@ -1,26 +0,0 @@ ---- a/src/rgw/rgw_rest_s3.cc 2018-08-31 01:24:39.000000000 +0800 -+++ b/src/rgw/rgw_rest_s3.cc 2019-04-04 17:22:37.615000000 +0800 -@@ -3751,8 +3751,9 @@ AWSGeneralAbstractor::get_auth_data_v4(c - boost::optional canonical_headers = \ - get_v4_canonical_headers(s->info, signed_hdrs, using_qs); - if (canonical_headers) { -- ldout(s->cct, 10) << "canonical headers format = " << *canonical_headers -- << dendl; -+ using sanitize = rgw::crypt_sanitize::log_content; -+ ldout(s->cct, 10) << "canonical headers format = " -+ << sanitize{*canonical_headers} << dendl; - } else { - throw -EPERM; - } ---- a/src/rgw/rgw_auth_s3.cc 2018-08-31 01:24:39.000000000 +0800 -+++ b/src/rgw/rgw_auth_s3.cc 2019-04-04 17:25:27.208000000 +0800 -@@ -659,7 +659,8 @@ get_v4_canon_req_hash(CephContext* cct, - - const auto canonical_req_hash = calc_hash_sha256(canonical_req); - -- ldout(cct, 10) << "canonical request = " << canonical_req << dendl; -+ using sanitize = rgw::crypt_sanitize::log_content; -+ ldout(cct, 10) << "canonical request = " << sanitize{canonical_req} << dendl; - ldout(cct, 10) << "canonical request hash = " - << buf_to_hex(canonical_req_hash).data() << dendl; - diff --git a/6001-CVE-2018-16846-1.patch b/6001-CVE-2018-16846-1.patch deleted file mode 100644 index 5f5887c3be685b11b43751a87c61056e1da6a5d5..0000000000000000000000000000000000000000 --- a/6001-CVE-2018-16846-1.patch +++ /dev/null @@ -1,172 +0,0 @@ -From 4337e6a7d9f92c8549ebee20d0dd67a01e49857f Mon Sep 17 00:00:00 2001 -From: "Robin H. Johnson" -Date: Fri, 21 Sep 2018 14:49:34 -0700 -Subject: [PATCH] rgw: enforce bounds on max-keys/max-uploads/max-parts - -RGW S3 listing operations provided a way for authenticated users to -cause a denial of service against OMAPs holding bucket indices. - -Bound the min & max values that a user could pass into the max-X -parameters, to keep the system safe. The default of 1000 is chosen to -match AWS S3 behavior. - -Affected operations: -- ListBucket, via max-keys -- ListBucketVersions, via max-keys -- ListBucketMultiPartUploads, via max-uploads -- ListMultipartUploadParts, via max-parts - -The Swift bucket listing codepath already enforced a limit, so is -unaffected by this issue. - -Prior to this commit, the effective limit is the lower of -osd_max_omap_entries_per_request or osd_max_omap_bytes_per_request. - -Backport: luminous, mimic -Fixes: http://tracker.ceph.com/issues/35994 -Signed-off-by: Robin H. Johnson -(cherry picked from commit d79f68a1e31f4bc917eec1b6bbc8e8446377dc6b) - - Conflicts: - src/common/options.cc: - Conflicts due to options from master ---- - src/common/options.cc | 11 +++++++++++ - src/rgw/rgw_op.cc | 21 +++++---------------- - src/rgw/rgw_op.h | 25 +++++++++++++++++++++++++ - src/rgw/rgw_rest.cc | 11 +++++------ - src/rgw/rgw_rest_swift.cc | 2 ++ - 5 files changed, 48 insertions(+), 22 deletions(-) - -diff --git a/src/common/options.cc b/src/common/options.cc -index c1a0e7b05ea0..5b62a3f7c3d6 100644 ---- a/src/common/options.cc -+++ b/src/common/options.cc -@@ -5705,6 +5705,17 @@ std::vector