You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficserver.apache.org by bu...@apache.org on 2012/03/22 04:11:55 UTC

svn commit: r809534 - in /websites/staging/trafficserver/trunk/content: ./ downloads.en.html

Author: buildbot
Date: Thu Mar 22 03:11:54 2012
New Revision: 809534

Log:
Staging update by buildbot for tserver

Modified:
    websites/staging/trafficserver/trunk/content/   (props changed)
    websites/staging/trafficserver/trunk/content/downloads.en.html

Propchange: websites/staging/trafficserver/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Thu Mar 22 03:11:54 2012
@@ -1 +1 @@
-1303644
+1303645

Modified: websites/staging/trafficserver/trunk/content/downloads.en.html
==============================================================================
--- websites/staging/trafficserver/trunk/content/downloads.en.html (original)
+++ websites/staging/trafficserver/trunk/content/downloads.en.html Thu Mar 22 03:11:54 2012
@@ -71,7 +71,7 @@ and checksum signatures. </p>
  [<a href="http://www.apache.org/dist/trafficserver/trafficserver-3.0.4.tar.bz2.sha1">SHA1</a>] 
  [<a href="http://www.apache.org/dyn/closer.cgi/trafficserver/trafficserver-3.0.4.tar.bz2">SRC</a>] </p>
 <h2 id="3.0.4Security">Important Security Fixes</h2>
-<p>This release fixes vulnerability, <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</a>,
+<p>This release fixes a vulnerability, <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</a>,
 where a large Host: headers can potentially crash the server.
 All users of all stable releases are urged to upgrade to 3.0.4. This includes all 2.0.x and 3.0.x releases prior
 to v3.0.4</p>
@@ -87,7 +87,7 @@ to v3.0.4</p>
 </ul>
 <h2 id="3.0.4NewFeature">New Feature</h2>
 <p>There are no new features in this release.</p>
-<p>More details are also in the <a href="https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;a=blob;f=CHANGES;h=9fe84e12fbc75f8f5c2e56fda089622443c1fa74;hb=0f57f149b0a42798ca09e0f3ce77393a6acb0ec2">CHANGES log</a>. </p>
+<p>More details are also in the <a href="https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;a=blob;f=CHANGES;h=b70108ada22f0b8872fbca218bcf09b2f3692c99;hb=f80179bce9133048d7d28cef59b4deb7adc22d20">CHANGES log</a>. </p>
 <div class="dl">
   <a href="http://www.apache.org/dyn/closer.cgi/trafficserver/trafficserver-3.0.4.tar.bz2">Download Source</a>
 </div>
@@ -99,7 +99,7 @@ to v3.0.4</p>
  [<a href="http://www.apache.org/dist/trafficserver/trafficserver-3.1.3-unstable.tar.bz2.sha1">SHA1</a>]
  [<a href="http://www.apache.org/dyn/closer.cgi/trafficserver/trafficserver-3.1.3-unstable.tar.bz2">SRC</a>]</p>
 <h2 id="3.1.3Security">Important Security Fixes</h2>
-<p>This release fixes vulnerability, <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</a>,
+<p>This release fixes a vulnerability, <a href="https://www.cert.fi/en/reports/2012/vulnerability612884.html">CVE-2012-0256</a>,
 where a large Host: headers can potentially crash the server.
 All users of all unstable development releases are urged to upgrade to 3.0.4. This includes all 2..x and 3.1.x releases prior
 to v3.1.3.</p>