Author: amc
Date: Tue Dec 16 16:25:24 2014
New Revision: 1645997

URL: http://svn.apache.org/r1645997
Log:
Traffic Server 5.1.2 release updates.


Modified:
    trafficserver/site/trunk/content/downloads.en.mdtext
    trafficserver/site/trunk/content/index.html

Modified: trafficserver/site/trunk/content/downloads.en.mdtext
URL: 
http://svn.apache.org/viewvc/trafficserver/site/trunk/content/downloads.en.mdtext?rev=1645997&r1=1645996&r2=1645997&view=diff
==============================================================================
--- trafficserver/site/trunk/content/downloads.en.mdtext (original)
+++ trafficserver/site/trunk/content/downloads.en.mdtext Tue Dec 16 16:25:24 
2014
@@ -30,18 +30,18 @@ compatible signature. You can also
 and checksum signatures.
 
 
-# Current v5.x Release -- 5.1.1 # {#5.1.1}
+# Current v5.x Release -- 5.1.2 # {#5.1.2}
 
- Apache Traffic Server 5.1.1 was released on October 31, 2014.
- 
[[`PGP`](http://www.apache.org/dist/trafficserver/trafficserver-5.1.1.tar.bz2.asc)]
- 
[[`MD5`](http://www.apache.org/dist/trafficserver/trafficserver-5.1.1.tar.bz2.md5)]
- 
[[`SHA1`](http://www.apache.org/dist/trafficserver/trafficserver-5.1.1.tar.bz2.sha1)]
+ Apache Traffic Server 5.1.1 was released on December 16, 2014.
+ 
[[`PGP`](http://www.apache.org/dist/trafficserver/trafficserver-5.1.2.tar.bz2.asc)]
+ 
[[`MD5`](http://www.apache.org/dist/trafficserver/trafficserver-5.1.2.tar.bz2.md5)]
+ 
[[`SHA1`](http://www.apache.org/dist/trafficserver/trafficserver-5.1.2.tar.bz2.sha1)]
 
-  <a 
href="http://www.apache.org/dyn/closer.cgi/trafficserver/trafficserver-5.1.1.tar.bz2";
 class="download_ts">Traffic Server 5.1.1</a>
+  <a 
href="http://www.apache.org/dyn/closer.cgi/trafficserver/trafficserver-5.1.2.tar.bz2";
 class="download_ts">Traffic Server 5.1.2</a>
 
-v5.1.1 is an incremental release over 5.0.1.
+v5.1.2 is an incremental release over 5.0.1.
 
-More details are also in the [CHANGES 
log](https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;a=blob_plain;f=CHANGES;hb=refs/tags/5.1.1)
 and the the Jira [Release 
Notes](https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12327088&styleName=Html&projectId=12310963&Create=Create&atl_token=A5KQ-2QAV-T4JA-FDED%7Cfb6e85a9e82c27f61df95aadd1538645809197e9%7Clin)
+More details are also in the [CHANGES 
log](https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12327089&styleName=Html&projectId=12310963&Create=Create&atl_token=A5KQ-2QAV-T4JA-FDED%7Ccf4a4c531a5e9f61e2695735edb0fc97d615481d%7Clin)
 
 # Current v4.x Release (Long Term Support) -- 4.2.2 # {#4.2.2}
 

Modified: trafficserver/site/trunk/content/index.html
URL: 
http://svn.apache.org/viewvc/trafficserver/site/trunk/content/index.html?rev=1645997&r1=1645996&r2=1645997&view=diff
==============================================================================
--- trafficserver/site/trunk/content/index.html (original)
+++ trafficserver/site/trunk/content/index.html Tue Dec 16 16:25:24 2014
@@ -67,12 +67,13 @@
        <P>
          All versions of Traffic Server prior to v5.0.1 (or v4.2.1.1) have a 
vulnerability related to
          the synthetic health checks as used by traffic_cop. We urge everyone
-         to upgrade to the latest releases, either v4.2.1.1 or v5.1.1. See
+         to upgrade to the latest releases, either v4.2.1.1 or v5.1.2. See
          CVE-2014-3525 for some details.
        </P>
        <p>
          Traffic Server 5.1.0 has a security issue that can lead to acting as 
an open relay under specific circumstances.
-         We urge all deployments of 5.1.0 to upgrade to 5.1.1. See 
CVE-2014-3624 and TS-2677 for more detail.
+         Traffic Server 5.1.1 has a security issue which makes it vulnerable 
to denial of service attacks.
+         We urge all deployments of 5.1.0 and 5.1.1 to upgrade to 5.1.2. See 
CVE-2014-3624 and TS-2677 for more detail.
        </p>
       </div>
     </div>
@@ -266,6 +267,7 @@
     <div class="twelvecol">
       <div id="blurbbox">
         <ul>
+         <li><b>December 16, 2014</b>5.1.2 is a security update for 5.1.1. We 
urge everyone to upgrade from 5.1.0 or 5.1.1 to 5.1.2 as soon as possible.</li>
           <li><b>October 31, 2014:</b>5.1.1 is a security update for 5.1.0. We
           urge everyone to upgrade from 5.1.0 to 5.1.1 as soon as possible. See
           CVE-2014-3566 and CVE-2014-3624.</li>


Reply via email to