salt: update to 2017.7.2.

SECURITY FIX

CVE-2017-14695 Directory traversal vulnerability in minion id
validation in SaltStack. Allows remote minions with incorrect
credentials to authenticate to a master via a crafted minion
ID. Credit for discovering the security flaw goes to: Julian Brost
(julian@0x4a42.net)

CVE-2017-14696 Remote Denial of Service with a specially crafted
authentication request. Credit for discovering the security flaw
goes to: Julian Brost (julian@0x4a42.net)
This commit is contained in:
Toyam Cox 2017-10-10 13:05:22 -04:00
parent 9854838083
commit 3b75185529

View file

@ -1,6 +1,6 @@
# Template file for 'salt'
pkgname=salt
version=2017.7.1
version=2017.7.2
revision=1
build_style=python2-module
noarch=yes
@ -16,7 +16,7 @@ maintainer="Toyam Cox <Vaelatern@gmail.com>"
license="Apache-2.0"
homepage="http://saltstack.org/"
distfiles="$PYPI_SITE/s/salt/salt-${version}.tar.gz"
checksum=fe868415d0e1162157186f4c5263e9af902b0571870ad2da210e7edf5ff5331d
checksum=ff3bc7de5abf01b8acbd144db5811b00867179b2353f5c6f7f19241e2eff2840
post_install() {
vmkdir /etc/salt 0750