Author: zwoop
Date: Thu Mar 22 03:11:38 2012
New Revision: 1303645

URL: http://svn.apache.org/viewvc?rev=1303645&view=rev
Log:
Fix a few links

Modified:
    trafficserver/site/trunk/content/downloads.en.mdtext

Modified: trafficserver/site/trunk/content/downloads.en.mdtext
URL: 
http://svn.apache.org/viewvc/trafficserver/site/trunk/content/downloads.en.mdtext?rev=1303645&r1=1303644&r2=1303645&view=diff
==============================================================================
--- trafficserver/site/trunk/content/downloads.en.mdtext (original)
+++ trafficserver/site/trunk/content/downloads.en.mdtext Thu Mar 22 03:11:38 
2012
@@ -40,7 +40,7 @@ and checksum signatures. 
 
 ##  Important Security Fixes  ## {#3.0.4Security}
 
-This release fixes vulnerability, 
[CVE-2012-0256](https://www.cert.fi/en/reports/2012/vulnerability612884.html),
+This release fixes a vulnerability, 
[CVE-2012-0256](https://www.cert.fi/en/reports/2012/vulnerability612884.html),
 where a large Host: headers can potentially crash the server.
 All users of all stable releases are urged to upgrade to 3.0.4. This includes 
all 2.0.x and 3.0.x releases prior
 to v3.0.4
@@ -59,7 +59,7 @@ to v3.0.4
 
 There are no new features in this release.
 
-More details are also in the [CHANGES 
log](https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;a=blob;f=CHANGES;h=9fe84e12fbc75f8f5c2e56fda089622443c1fa74;hb=0f57f149b0a42798ca09e0f3ce77393a6acb0ec2).
 
+More details are also in the [CHANGES 
log](https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;a=blob;f=CHANGES;h=b70108ada22f0b8872fbca218bcf09b2f3692c99;hb=f80179bce9133048d7d28cef59b4deb7adc22d20).
 
 
 <div class="dl">
   <a 
href="http://www.apache.org/dyn/closer.cgi/trafficserver/trafficserver-3.0.4.tar.bz2";>Download
 Source</a>
@@ -76,7 +76,7 @@ More details are also in the [CHANGES lo
 
 ##  Important Security Fixes  ## {#3.1.3Security}
 
-This release fixes vulnerability, 
[CVE-2012-0256](https://www.cert.fi/en/reports/2012/vulnerability612884.html),
+This release fixes a vulnerability, 
[CVE-2012-0256](https://www.cert.fi/en/reports/2012/vulnerability612884.html),
 where a large Host: headers can potentially crash the server.
 All users of all unstable development releases are urged to upgrade to 3.0.4. 
This includes all 2..x and 3.1.x releases prior
 to v3.1.3.


Reply via email to