Apache CouchDB 1.5.1 has been released and is available for download.
Grab your copy here:
Pre-built packages for Windows and OS X are available.
CouchDB 1.5.1 is a security release, and was originally published on 2014-04-09.
These release notes are based on the changelog.
- Add the max_count option (UUIDs Configuration) to allow rate-limiting
the amount of UUIDs that can be requested from the /_uuids
handler in a single request.
You may or may not have heard about the Heartbleed SSL/TLS vulnerability yet. Without much exaggeration, this is a big one.
What does this mean for CouchDB?
If you are using CouchDB with the built-in SSL support, you are at the whim of Erlang/OTP’s handling of SSL. Lucky for you, while they do use OpenSSL for the heavy lifting, they do the TLS/SSL handshake logic in Erlang (Source). That means you are not affected by this issue.
If you are using CouchDB behind a third-party proxy server you are at the whim of the SSL library it uses. For the big three Apache, nginx and HAProxy it’s all OpenSSL. So if they are using OpenSSL 1.0.1-1.0.1f with heartbeat support (RFC6520) enabled (the default), you need to take action. As far as I can tell now:
- 0. Check if you are vulnerable
- 1. Stop your service.
- 2. Upgrade to OpenSSL 1.0.1g or recompile OpenSSL without heartbeat support.
- 3. Request new cert from your SSL cert vendor.
- 4. Revoke your old cert.
- 5. Invalidate all existing sessions by changing the CouchDB couchdb_httpd_auth/secret configuration value to a new UUID.
- 6. Restart your service.
- 7. Invalidate all your user’s passwords and/or OAuth tokens.
- 8. Notify your users that any of their data and passwords are potentially compromised.