Merge branch '2018.3' into 49965_beacon_diskusage_windows

This commit is contained in:
Gareth J. Greenaway 2018-10-24 09:42:36 -07:00 committed by GitHub
commit 1f0ab278f0
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 29 additions and 8 deletions

View file

@ -251,8 +251,8 @@ on_saltstack = 'SALT_ON_SALTSTACK' in os.environ
project = 'Salt'
version = salt.version.__version__
latest_release = '2018.3.2' # latest release
previous_release = '2017.7.7' # latest release from previous branch
latest_release = '2018.3.3' # latest release
previous_release = '2017.7.8' # latest release from previous branch
previous_release_dir = '2017.7' # path on web server for previous branch
next_release = '' # next release
next_release_dir = '' # path on web server for next release branch

View file

@ -0,0 +1,15 @@
=============================
Salt 2016.11.10 Release Notes
=============================
Version 2016.11.10 is a security release for :ref:`2016.11.0 <release-2016-11-0>`.
Changes for v2016.11.9..v2016.11.10
-----------------------------------
Security Fix
============
CVE-2018-15751 Remote command execution and incorrect access control when using salt-api.
CVE-2018-15750 Directory traversal vulnerability when using salt-api. Allows an attacker to determine what files exist on a server when querying /run or /events.

View file

@ -1,9 +1,8 @@
========================================
In Progress: Salt 2018.3.3 Release Notes
========================================
===========================
Salt 2018.3.3 Release Notes
===========================
Version 2018.3.3 is an **unreleased** bugfix release for :ref:`2018.3.0 <release-2018-3-0>`.
This release is still in progress and has not been released yet.
Version 2018.3.3 is a security and bugfix release for :ref:`2018.3.0 <release-2018-3-0>`.
Statistics
==========
@ -44,6 +43,13 @@ Statistics
- template: jinja
- defaults: {{ mydict | tojson }}
Security Fix
============
CVE-2018-15751 Remote command execution and incorrect access control when using salt-api.
CVE-2018-15750 Directory traversal vulnerability when using salt-api. Allows an attacker to determine what files exist on a server when querying /run or /events.
Changes to win_timezone
=======================

View file

@ -4,7 +4,7 @@ mock>=2.0.0
SaltPyLint>=v2017.3.6
pytest>=3.5.0
git+https://github.com/saltstack/pytest-salt.git@master#egg=pytest-salt
testinfra>=1.7.0
testinfra>=1.7.0,!=1.17.0
# httpretty Needs to be here for now even though it's a dependency of boto.
# A pip install on a fresh system will decide to target httpretty 0.8.10 to