salt: update to 2017.7.2.
SECURITY FIX CVE-2017-14695 Directory traversal vulnerability in minion id validation in SaltStack. Allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net) CVE-2017-14696 Remote Denial of Service with a specially crafted authentication request. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net)
This commit is contained in:
parent
9854838083
commit
3b75185529
1 changed files with 2 additions and 2 deletions
|
@ -1,6 +1,6 @@
|
|||
# Template file for 'salt'
|
||||
pkgname=salt
|
||||
version=2017.7.1
|
||||
version=2017.7.2
|
||||
revision=1
|
||||
build_style=python2-module
|
||||
noarch=yes
|
||||
|
@ -16,7 +16,7 @@ maintainer="Toyam Cox <Vaelatern@gmail.com>"
|
|||
license="Apache-2.0"
|
||||
homepage="http://saltstack.org/"
|
||||
distfiles="$PYPI_SITE/s/salt/salt-${version}.tar.gz"
|
||||
checksum=fe868415d0e1162157186f4c5263e9af902b0571870ad2da210e7edf5ff5331d
|
||||
checksum=ff3bc7de5abf01b8acbd144db5811b00867179b2353f5c6f7f19241e2eff2840
|
||||
|
||||
post_install() {
|
||||
vmkdir /etc/salt 0750
|
||||
|
|
Loading…
Reference in a new issue