You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficserver.apache.org by bu...@apache.org on 2017/10/29 16:15:44 UTC
svn commit: r1020189 - in /websites/staging/trafficserver/trunk: cgi-bin/
content/ content/index.html
Author: buildbot
Date: Sun Oct 29 16:15:44 2017
New Revision: 1020189
Log:
Staging update by buildbot for trafficserver
Modified:
websites/staging/trafficserver/trunk/cgi-bin/ (props changed)
websites/staging/trafficserver/trunk/content/ (props changed)
websites/staging/trafficserver/trunk/content/index.html
Propchange: websites/staging/trafficserver/trunk/cgi-bin/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Sun Oct 29 16:15:44 2017
@@ -1 +1 @@
-1807613
+1813688
Propchange: websites/staging/trafficserver/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Sun Oct 29 16:15:44 2017
@@ -1 +1 @@
-1807613
+1813688
Modified: websites/staging/trafficserver/trunk/content/index.html
==============================================================================
--- websites/staging/trafficserver/trunk/content/index.html (original)
+++ websites/staging/trafficserver/trunk/content/index.html Sun Oct 29 16:15:44 2017
@@ -58,24 +58,11 @@
<div class="row content">
<div class="eightcol">
<div id="blurbbox">
- <p>Apache Traffic Server⢠software is a fast, scalable and extensible HTTP/1.1 compliant caching
+ <p>Apache Traffic Server⢠software is a fast, scalable and extensible HTTP/1.1 and HTTP/2.0 compliant caching
proxy server. Formerly a commercial product, Yahoo! donated it to the Apache
Foundation, and it is now an Apache TLP. Here's a <a href=
"http://ostatic.com/blog/guest-post-yahoos-cloud-team-open-sources-traffic-server">Traffic
Server overview</a>.</p>
- <br>
- <P><b>Important security announcements</b>:</P>
- <P>
- All versions of Traffic Server prior to v5.0.1 (or v4.2.1.1) have a vulnerability related to
- the synthetic health checks as used by traffic_cop. We urge everyone
- to upgrade to the latest releases, either v4.2.1.1 or v5.1.2. See
- CVE-2014-3525 for some details.
- </P>
- <p>
- Traffic Server 5.1.0 has a security issue that can lead to acting as an open relay under specific circumstances.
- Traffic Server 5.1.1 has a security issue which makes it vulnerable to denial of service attacks.
- We urge all deployments of 5.1.0 and 5.1.1 to upgrade to 5.1.2. See CVE-2014-3624 and TS-2677 for more detail.
- </p>
</div>
</div>
<div class="fourcol right last">