Author: buildbot
Date: Tue Dec 16 16:25:32 2014
New Revision: 932987
Log:
Staging update by buildbot for trafficserver
Modified:
websites/staging/trafficserver/trunk/cgi-bin/ (props changed)
websites/staging/trafficserver/trunk/content/ (props changed)
websites/staging/trafficserver/trunk/content/downloads.en.html
websites/staging/trafficserver/trunk/content/index.html
Propchange: websites/staging/trafficserver/trunk/cgi-bin/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Tue Dec 16 16:25:32 2014
@@ -1 +1 @@
-1638938
+1645997
Propchange: websites/staging/trafficserver/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Tue Dec 16 16:25:32 2014
@@ -1 +1 @@
-1638938
+1645997
Modified: websites/staging/trafficserver/trunk/content/downloads.en.html
==============================================================================
--- websites/staging/trafficserver/trunk/content/downloads.en.html (original)
+++ websites/staging/trafficserver/trunk/content/downloads.en.html Tue Dec 16
16:25:32 2014
@@ -65,14 +65,14 @@ these are all compatible.</p>
compatible signature. You can also
<a href="http://archive.apache.org/dist/trafficserver/">browse through all
releases</a>
and checksum signatures.</p>
-<h1 id="5.1.1">Current v5.x Release -- 5.1.1</h1>
-<p>Apache Traffic Server 5.1.1 was released on October 31, 2014.
- [<a
href="http://www.apache.org/dist/trafficserver/trafficserver-5.1.1.tar.bz2.asc"><code>PGP</code></a>]
- [<a
href="http://www.apache.org/dist/trafficserver/trafficserver-5.1.1.tar.bz2.md5"><code>MD5</code></a>]
- [<a
href="http://www.apache.org/dist/trafficserver/trafficserver-5.1.1.tar.bz2.sha1"><code>SHA1</code></a>]</p>
-<p><a
href="http://www.apache.org/dyn/closer.cgi/trafficserver/trafficserver-5.1.1.tar.bz2"
class="download_ts">Traffic Server 5.1.1</a></p>
-<p>v5.1.1 is an incremental release over 5.0.1.</p>
-<p>More details are also in the <a
href="https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;a=blob_plain;f=CHANGES;hb=refs/tags/5.1.1">CHANGES
log</a> and the the Jira <a
href="https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12327088&styleName=Html&projectId=12310963&Create=Create&atl_token=A5KQ-2QAV-T4JA-FDED%7Cfb6e85a9e82c27f61df95aadd1538645809197e9%7Clin">Release
Notes</a></p>
+<h1 id="5.1.2">Current v5.x Release -- 5.1.2</h1>
+<p>Apache Traffic Server 5.1.1 was released on December 16, 2014.
+ [<a
href="http://www.apache.org/dist/trafficserver/trafficserver-5.1.2.tar.bz2.asc"><code>PGP</code></a>]
+ [<a
href="http://www.apache.org/dist/trafficserver/trafficserver-5.1.2.tar.bz2.md5"><code>MD5</code></a>]
+ [<a
href="http://www.apache.org/dist/trafficserver/trafficserver-5.1.2.tar.bz2.sha1"><code>SHA1</code></a>]</p>
+<p><a
href="http://www.apache.org/dyn/closer.cgi/trafficserver/trafficserver-5.1.2.tar.bz2"
class="download_ts">Traffic Server 5.1.2</a></p>
+<p>v5.1.2 is an incremental release over 5.0.1.</p>
+<p>More details are also in the <a
href="https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12327089&styleName=Html&projectId=12310963&Create=Create&atl_token=A5KQ-2QAV-T4JA-FDED%7Ccf4a4c531a5e9f61e2695735edb0fc97d615481d%7Clin">CHANGES
log</a></p>
<h1 id="4.2.2">Current v4.x Release (Long Term Support) -- 4.2.2</h1>
<p>Apache Traffic Server 4.2.2 was released on September 4, 2014.
[<a
href="http://www.apache.org/dist/trafficserver/trafficserver-4.2.2.tar.bz2.asc"><code>PGP</code></a>]
Modified: websites/staging/trafficserver/trunk/content/index.html
==============================================================================
--- websites/staging/trafficserver/trunk/content/index.html (original)
+++ websites/staging/trafficserver/trunk/content/index.html Tue Dec 16 16:25:32
2014
@@ -67,12 +67,13 @@
<P>
All versions of Traffic Server prior to v5.0.1 (or v4.2.1.1) have a
vulnerability related to
the synthetic health checks as used by traffic_cop. We urge everyone
- to upgrade to the latest releases, either v4.2.1.1 or v5.1.1. See
+ to upgrade to the latest releases, either v4.2.1.1 or v5.1.2. See
CVE-2014-3525 for some details.
</P>
<p>
Traffic Server 5.1.0 has a security issue that can lead to acting as
an open relay under specific circumstances.
- We urge all deployments of 5.1.0 to upgrade to 5.1.1. See
CVE-2014-3624 and TS-2677 for more detail.
+ Traffic Server 5.1.1 has a security issue which makes it vulnerable
to denial of service attacks.
+ We urge all deployments of 5.1.0 and 5.1.1 to upgrade to 5.1.2. See
CVE-2014-3624 and TS-2677 for more detail.
</p>
</div>
</div>
@@ -266,6 +267,7 @@
<div class="twelvecol">
<div id="blurbbox">
<ul>
+ <li><b>December 16, 2014</b>5.1.2 is a security update for 5.1.1. We
urge everyone to upgrade from 5.1.0 or 5.1.1 to 5.1.2 as soon as possible.</li>
<li><b>October 31, 2014:</b>5.1.1 is a security update for 5.1.0. We
urge everyone to upgrade from 5.1.0 to 5.1.1 as soon as possible. See
CVE-2014-3566 and CVE-2014-3624.</li>