Jump to content


New Release of Perforce Swarm; Patch for SSL/TLS MITM Vulnerability in OpenSSL; Technical Support Infrastructure Improvements

tech support swarm heartbleed patch code review swarm 2014.3

  • Please log in to reply
No replies to this topic

#1 Perforce Software

Perforce Software

    Advanced Member

  • Staff
  • 108 posts

Posted 04 August 2014 - 05:33 PM

Here's what’s new from Perforce, available from the Downloads section of our website.

Perforce Swarm 2014.3 - Smoother Review Workflows
This release improves the review workflow in Swarm. New features of our
2014.3 release include:
  • Lightweight issue management within a code review
  • More control over diff context for easier understanding of changes
  • Smoother review mechanics, particularly when many files are involved
  • Sticky filtering reduces the time spent playing with settings
Download Swarm 2014.3 | Release Notes

SSL/TLS MITM Vulnerability - P4D Patch Available for Download
Perforce server versions 2012.1 to 2014.1 have been patched to address the
SSL/TLS MITM CVE-2014-0224 vulnerability in OpenSSL by linking in version 1.0.1h.
This issue is a follow-on to the Heartbleed vulnerability from earlier this year.

Download updated versions of P4D from our website at perforce.com/downloads.
Please select the appropriate platform, OS and release number from the drop-down menus.

Perforce Support - FTP Server Upgrades for Faster File Uploads
As of July 30, 2014, Perforce customers looking to transfer files to our support
teams should use our new FTP server "upload.perforce.com" instead of
"ftp.perforce.com." You can obtain login credentials from Support,
or create your own credentials from your existing portal account.

You can contact Perforce Support with any questions.

Sign Up for Monthly Product Updates
You can sign up to receive monthly product updates by email in the Communication Center.





Also tagged with one or more of these keywords: tech support, swarm, heartbleed patch, code review, swarm 2014.3

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users