You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficserver.apache.org by bu...@apache.org on 2012/03/22 04:06:55 UTC
svn commit: r809532 - in /websites/staging/trafficserver/trunk/content: ./
index.html
Author: buildbot
Date: Thu Mar 22 03:06:55 2012
New Revision: 809532
Log:
Staging update by buildbot for tserver
Modified:
websites/staging/trafficserver/trunk/content/ (props changed)
websites/staging/trafficserver/trunk/content/index.html
Propchange: websites/staging/trafficserver/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Thu Mar 22 03:06:55 2012
@@ -1 +1 @@
-1303640
+1303643
Modified: websites/staging/trafficserver/trunk/content/index.html
==============================================================================
--- websites/staging/trafficserver/trunk/content/index.html (original)
+++ websites/staging/trafficserver/trunk/content/index.html Thu Mar 22 03:06:55 2012
@@ -57,10 +57,11 @@
Foundation, and it is now an Apache TLP. Here's a <a href=
"http://ostatic.com/blog/guest-post-yahoos-cloud-team-open-sources-traffic-server">Traffic
Server overview</a>.</p>
- <P><b>Important security announcement<b>: All versions of Traffic Server prior to v3.0.4 and
+ <br>
+ <P><b>Important security announcement</b>: All versions of Traffic Server prior to v3.0.4 and
v3.1.3 have a vulnerability where a large Host: header can crash the server under
certain conditions. Everyone is encouraged to upgrade as soon as possible. For more
- details, see <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</href>.
+ details, see <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</a>.
New releases addressing this issue are available on the <a href="downloads">Download page</a>.
</div>
</div>
@@ -236,7 +237,7 @@
<div class="twelvecol">
<div id="blurbbox">
<ul>
- <li><b>March 21, 2012:</b> The Apache Traffic Server v3.0.4 and v3.1.3-unstable is now available on the <a href="http://www.apache.org/dyn/closer.cgi/trafficserver/">Apache mirrors</a>. These releases both address a vulnerability discovered in all previous Apache Traffic Server versions. Users of ATS are encouraged to upgrade to one of the two releases as soon as possible. For more details, see <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</href>.</li>
+ <li><b>March 21, 2012:</b> The Apache Traffic Server v3.0.4 and v3.1.3-unstable is now available on the <a href="http://www.apache.org/dyn/closer.cgi/trafficserver/">Apache mirrors</a>. These releases both address a vulnerability discovered in all previous Apache Traffic Server versions. Users of ATS are encouraged to upgrade to one of the two releases as soon as possible. For more details, see <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</a>.</li>
<li><b>February 8, 2012:</b> The Apache Traffic Server 3.1.2-unstable is now available on the <a href="http://www.apache.org/dyn/closer.cgi/trafficserver/">Apache mirrors</a>.</li>
<li><b>January 27, 2012:</b> The Apache Traffic community welcomes our three new committers: James Peach, Brian Geffon and Bart Wyatt!</li>
<li><b>December 07, 2011:</b> The Apache Traffic Server 3.0.2 is now available on the <a href="http://www.apache.org/dyn/closer.cgi/trafficserver/">Apache mirrors</a>.</li>