You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@couchdb.apache.org by wo...@apache.org on 2018/07/12 13:43:37 UTC
[couchdb-documentation] branch 2.1.x updated: fix the build
This is an automated email from the ASF dual-hosted git repository.
wohali pushed a commit to branch 2.1.x
in repository https://gitbox.apache.org/repos/asf/couchdb-documentation.git
The following commit(s) were added to refs/heads/2.1.x by this push:
new 1334fbd fix the build
1334fbd is described below
commit 1334fbd5732df9ef4105a509aa3dee378c7490cb
Author: Joan Touzet <jo...@atypical.net>
AuthorDate: Thu Jul 12 09:43:21 2018 -0400
fix the build
---
.travis.yml | 2 +-
requirements.txt | 2 ++
src/cve/2018-8007.rst | 3 ++-
3 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/.travis.yml b/.travis.yml
index 4eba051..10478b9 100644
--- a/.travis.yml
+++ b/.travis.yml
@@ -4,7 +4,7 @@ python:
- 3.6
install:
- - pip install sphinx sphinx_rtd_theme
+ - pip install -r requirements.txt
script:
- make ${TARGET}
diff --git a/requirements.txt b/requirements.txt
new file mode 100644
index 0000000..e5d77a9
--- /dev/null
+++ b/requirements.txt
@@ -0,0 +1,2 @@
+Sphinx==1.7.4
+sphinx-rtd-theme==0.4.0
diff --git a/src/cve/2018-8007.rst b/src/cve/2018-8007.rst
index f187989..c99d6bd 100644
--- a/src/cve/2018-8007.rst
+++ b/src/cve/2018-8007.rst
@@ -35,7 +35,8 @@ bypassing the backlist of configuration settings that are not allowed to be
modified via the HTTP API.
This privilege escalation effectively allows a CouchDB admin user to gain
-arbitrary remote code execution, bypassing :ref:`CVE-2017-12636 <cve/2017-12636>`
+arbitrary remote code execution, bypassing
+:ref:`CVE-2017-12636 <cve/2017-12636>`
Mitigation
==========