From 3b7518552967068c3e4d9bdff189e8d0a72653ec Mon Sep 17 00:00:00 2001 From: Toyam Cox Date: Tue, 10 Oct 2017 13:05:22 -0400 Subject: [PATCH] salt: update to 2017.7.2. SECURITY FIX CVE-2017-14695 Directory traversal vulnerability in minion id validation in SaltStack. Allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net) CVE-2017-14696 Remote Denial of Service with a specially crafted authentication request. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net) --- srcpkgs/salt/template | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/srcpkgs/salt/template b/srcpkgs/salt/template index a3c7455f218..773d324aa6f 100644 --- a/srcpkgs/salt/template +++ b/srcpkgs/salt/template @@ -1,6 +1,6 @@ # Template file for 'salt' pkgname=salt -version=2017.7.1 +version=2017.7.2 revision=1 build_style=python2-module noarch=yes @@ -16,7 +16,7 @@ maintainer="Toyam Cox " license="Apache-2.0" homepage="http://saltstack.org/" distfiles="$PYPI_SITE/s/salt/salt-${version}.tar.gz" -checksum=fe868415d0e1162157186f4c5263e9af902b0571870ad2da210e7edf5ff5331d +checksum=ff3bc7de5abf01b8acbd144db5811b00867179b2353f5c6f7f19241e2eff2840 post_install() { vmkdir /etc/salt 0750