Return-Path: X-Original-To: apmail-trafficserver-dev-archive@www.apache.org Delivered-To: apmail-trafficserver-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 8B2FC18C27 for ; Thu, 2 Jul 2015 18:45:25 +0000 (UTC) Received: (qmail 33612 invoked by uid 500); 2 Jul 2015 18:45:25 -0000 Delivered-To: apmail-trafficserver-dev-archive@trafficserver.apache.org Received: (qmail 33469 invoked by uid 500); 2 Jul 2015 18:45:25 -0000 Mailing-List: contact dev-help@trafficserver.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@trafficserver.apache.org Delivered-To: mailing list dev@trafficserver.apache.org Received: (qmail 33448 invoked by uid 99); 2 Jul 2015 18:45:25 -0000 Received: from mail-relay.apache.org (HELO mail-relay.apache.org) (140.211.11.15) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 02 Jul 2015 18:45:25 +0000 Received: from [17.149.224.153] (unknown [17.149.224.153]) by mail-relay.apache.org (ASF Mail Server at mail-relay.apache.org) with ESMTPSA id 939941A027F; Thu, 2 Jul 2015 18:45:24 +0000 (UTC) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2102\)) Subject: Re: [VOTE] Release Apache Traffic Server 5.3.1 (RC0) From: Leif Hedstrom In-Reply-To: Date: Thu, 2 Jul 2015 12:45:22 -0600 Cc: "users@trafficserver.apache.org" Content-Transfer-Encoding: quoted-printable Message-Id: References: To: dev@trafficserver.apache.org X-Mailer: Apple Mail (2.2102) > On Jun 29, 2015, at 10:56 PM, Phil Sorber wrote: >=20 > Hello All, >=20 > I've prepared a release for v5.3.1 (RC0) which is the latest stable = release > in the 5.3.x series. This is the second release in our Long Term = Support > (LTS) version as detailed in our Release Management document: >=20 > https://cwiki.apache.org/confluence/display/TS/Release+Management >=20 > Changes since 5.3.0: >=20 > = https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=3D12327092&= projectId=3D12310963 >=20 > Of special note are two fixes for CVE-2015-3249 that effect the HTTP/2 > experimental feature in Apache Traffic Server 5.3.0. They are both DOS > attacks and can be avoided by simply disabling HTTP/2 or upgrading. Tested on CentOS7 and Fedora 20. Signatures validates. +1. =E2=80=94 Leif