You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficserver.apache.org by zw...@apache.org on 2012/03/22 04:06:45 UTC
svn commit: r1303643 - /trafficserver/site/trunk/content/index.html
Author: zwoop
Date: Thu Mar 22 03:06:45 2012
New Revision: 1303643
URL: http://svn.apache.org/viewvc?rev=1303643&view=rev
Log:
Typos
Modified:
trafficserver/site/trunk/content/index.html
Modified: trafficserver/site/trunk/content/index.html
URL: http://svn.apache.org/viewvc/trafficserver/site/trunk/content/index.html?rev=1303643&r1=1303642&r2=1303643&view=diff
==============================================================================
--- trafficserver/site/trunk/content/index.html (original)
+++ trafficserver/site/trunk/content/index.html Thu Mar 22 03:06:45 2012
@@ -57,10 +57,11 @@
Foundation, and it is now an Apache TLP. Here's a <a href=
"http://ostatic.com/blog/guest-post-yahoos-cloud-team-open-sources-traffic-server">Traffic
Server overview</a>.</p>
- <P><b>Important security announcement<b>: All versions of Traffic Server prior to v3.0.4 and
+ <br>
+ <P><b>Important security announcement</b>: All versions of Traffic Server prior to v3.0.4 and
v3.1.3 have a vulnerability where a large Host: header can crash the server under
certain conditions. Everyone is encouraged to upgrade as soon as possible. For more
- details, see <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</href>.
+ details, see <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</a>.
New releases addressing this issue are available on the <a href="downloads">Download page</a>.
</div>
</div>
@@ -236,7 +237,7 @@
<div class="twelvecol">
<div id="blurbbox">
<ul>
- <li><b>March 21, 2012:</b> The Apache Traffic Server v3.0.4 and v3.1.3-unstable is now available on the <a href="http://www.apache.org/dyn/closer.cgi/trafficserver/">Apache mirrors</a>. These releases both address a vulnerability discovered in all previous Apache Traffic Server versions. Users of ATS are encouraged to upgrade to one of the two releases as soon as possible. For more details, see <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</href>.</li>
+ <li><b>March 21, 2012:</b> The Apache Traffic Server v3.0.4 and v3.1.3-unstable is now available on the <a href="http://www.apache.org/dyn/closer.cgi/trafficserver/">Apache mirrors</a>. These releases both address a vulnerability discovered in all previous Apache Traffic Server versions. Users of ATS are encouraged to upgrade to one of the two releases as soon as possible. For more details, see <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</a>.</li>
<li><b>February 8, 2012:</b> The Apache Traffic Server 3.1.2-unstable is now available on the <a href="http://www.apache.org/dyn/closer.cgi/trafficserver/">Apache mirrors</a>.</li>
<li><b>January 27, 2012:</b> The Apache Traffic community welcomes our three new committers: James Peach, Brian Geffon and Bart Wyatt!</li>
<li><b>December 07, 2011:</b> The Apache Traffic Server 3.0.2 is now available on the <a href="http://www.apache.org/dyn/closer.cgi/trafficserver/">Apache mirrors</a>.</li>