This is an automated email from the ASF dual-hosted git repository. wohali pushed a commit to branch fix-the-build in repository https://gitbox.apache.org/repos/asf/couchdb-documentation.git
commit 093317f3ff242152ff6aecb8ce7de37b8a6cf4a6 Author: Joan Touzet <[email protected]> AuthorDate: Thu Jul 12 09:43:21 2018 -0400 fix the build --- .travis.yml | 2 +- requirements.txt | 2 ++ src/cve/2018-8007.rst | 3 ++- 3 files changed, 5 insertions(+), 2 deletions(-) diff --git a/.travis.yml b/.travis.yml index 4eba051..10478b9 100644 --- a/.travis.yml +++ b/.travis.yml @@ -4,7 +4,7 @@ python: - 3.6 install: - - pip install sphinx sphinx_rtd_theme + - pip install -r requirements.txt script: - make ${TARGET} diff --git a/requirements.txt b/requirements.txt new file mode 100644 index 0000000..e5d77a9 --- /dev/null +++ b/requirements.txt @@ -0,0 +1,2 @@ +Sphinx==1.7.4 +sphinx-rtd-theme==0.4.0 diff --git a/src/cve/2018-8007.rst b/src/cve/2018-8007.rst index f187989..c99d6bd 100644 --- a/src/cve/2018-8007.rst +++ b/src/cve/2018-8007.rst @@ -35,7 +35,8 @@ bypassing the backlist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain -arbitrary remote code execution, bypassing :ref:`CVE-2017-12636 <cve/2017-12636>` +arbitrary remote code execution, bypassing +:ref:`CVE-2017-12636 <cve/2017-12636>` Mitigation ==========
