summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAlexander Shorin <kxepal@apache.org>2014-04-15 09:12:34 +0200
committerDirkjan Ochtman <dirkjan@ochtman.nl>2014-04-15 22:28:18 +0200
commitb532aa80193fb2f80e46e2114104ed306cfa558e (patch)
tree1bfc397edcd49c4b0e2ca0cb803b97cb75df6cf0
parentd1ca821f015cceb98da443dc8e4e6478c97cf644 (diff)
downloadcouchdb-b532aa80193fb2f80e46e2114104ed306cfa558e.tar.gz
Add CVE-2014-2668 warning to old release branches
-rw-r--r--share/doc/src/whatsnew/1.3.rst4
-rw-r--r--share/doc/src/whatsnew/1.4.rst4
-rw-r--r--share/doc/src/whatsnew/1.5.rst7
3 files changed, 14 insertions, 1 deletions
diff --git a/share/doc/src/whatsnew/1.3.rst b/share/doc/src/whatsnew/1.3.rst
index 7e697855c..3f19f56bc 100644
--- a/share/doc/src/whatsnew/1.3.rst
+++ b/share/doc/src/whatsnew/1.3.rst
@@ -21,6 +21,10 @@
:depth: 1
:local:
+.. warning::
+
+ :ref:`release/1.3.x` is affected by the issue described in :ref:`cve/2014-2668`.
+ Upgrading to a more recent release is strongly recommended.
.. _release/1.3.x/upgrade:
diff --git a/share/doc/src/whatsnew/1.4.rst b/share/doc/src/whatsnew/1.4.rst
index cf10befe6..65925e176 100644
--- a/share/doc/src/whatsnew/1.4.rst
+++ b/share/doc/src/whatsnew/1.4.rst
@@ -21,6 +21,10 @@
:depth: 1
:local:
+.. warning::
+
+ :ref:`release/1.4.x` is affected by the issue described in :ref:`cve/2014-2668`.
+ Upgrading to a more recent release is strongly recommended.
.. _release/1.4.x/upgrade:
diff --git a/share/doc/src/whatsnew/1.5.rst b/share/doc/src/whatsnew/1.5.rst
index 7f2d7509c..1b7539a25 100644
--- a/share/doc/src/whatsnew/1.5.rst
+++ b/share/doc/src/whatsnew/1.5.rst
@@ -21,6 +21,11 @@
:depth: 1
:local:
+.. warning::
+
+ :ref:`release/1.5.1` contains important security fixes. Previous `1.5.x`
+ releases are not recommended for regular usage.
+
.. _release/1.5.1:
Version 1.5.1
@@ -28,7 +33,7 @@ Version 1.5.1
* Add the ``max_count`` option (:ref:`config/uuids`) to allow rate-limiting
the amount of UUIDs that can be requested from the :ref:`api/server/uuids`
- handler in a single request.
+ handler in a single request (:ref:`CVE 2014-2668 <cve/2014-2668>`).
.. _release/1.5.0: