You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@couchdb.apache.org by wo...@apache.org on 2018/07/12 13:52:26 UTC

[couchdb-documentation] 02/02: fix the build

This is an automated email from the ASF dual-hosted git repository.

wohali pushed a commit to branch fix-the-build
in repository https://gitbox.apache.org/repos/asf/couchdb-documentation.git

commit 093317f3ff242152ff6aecb8ce7de37b8a6cf4a6
Author: Joan Touzet <jo...@atypical.net>
AuthorDate: Thu Jul 12 09:43:21 2018 -0400

    fix the build
---
 .travis.yml           | 2 +-
 requirements.txt      | 2 ++
 src/cve/2018-8007.rst | 3 ++-
 3 files changed, 5 insertions(+), 2 deletions(-)

diff --git a/.travis.yml b/.travis.yml
index 4eba051..10478b9 100644
--- a/.travis.yml
+++ b/.travis.yml
@@ -4,7 +4,7 @@ python:
   - 3.6
 
 install:
-  - pip install sphinx sphinx_rtd_theme
+  - pip install -r requirements.txt
 
 script:
   - make ${TARGET}
diff --git a/requirements.txt b/requirements.txt
new file mode 100644
index 0000000..e5d77a9
--- /dev/null
+++ b/requirements.txt
@@ -0,0 +1,2 @@
+Sphinx==1.7.4
+sphinx-rtd-theme==0.4.0
diff --git a/src/cve/2018-8007.rst b/src/cve/2018-8007.rst
index f187989..c99d6bd 100644
--- a/src/cve/2018-8007.rst
+++ b/src/cve/2018-8007.rst
@@ -35,7 +35,8 @@ bypassing the backlist of configuration settings that are not allowed to be
 modified via the HTTP API.
 
 This privilege escalation effectively allows a CouchDB admin user to gain
-arbitrary remote code execution, bypassing :ref:`CVE-2017-12636 <cve/2017-12636>`
+arbitrary remote code execution, bypassing
+:ref:`CVE-2017-12636 <cve/2017-12636>`
 
 Mitigation
 ==========