diff options
-rw-r--r-- | website/index.html | 24 |
1 files changed, 9 insertions, 15 deletions
diff --git a/website/index.html b/website/index.html index 7b59e853..90ce8380 100644 --- a/website/index.html +++ b/website/index.html @@ -15,7 +15,7 @@ <table width="100%" cellpadding="0" summary="Canned page header"> <tr> <td>Fetchmail</td> -<td align="right"><!-- update date -->2008-11-16</td> +<td align="right"><!-- update date -->2009-07-02</td> </tr> </table> </div> @@ -46,24 +46,16 @@ href="http://mandree.home.pages.de/fetchmail/">fetchmail-6.3.6-rc5 was released< --> <div style="background-color:#c0ffc0;color:#000000;"> - <h1>NEWS: FETCHMAIL 6.3.9 RELEASE</h1> - <p>On 2008-11-16, <a href="http://developer.berlios.de/project/showfiles.php?group_id=1824">fetchmail-6.3.9 + <h1>NEWS: FETCHMAIL 6.3.10 RELEASE</h1> + <p>On 2009-07-02, <a + href="http://developer.berlios.de/project/showfiles.php?group_id=1824">fetchmail-6.3.10 has been released (this is the download link),</a> fixing - various bugs, among them the security issues CVE-2008-2711 and - CVE-2007-4565, and two critical bugs. <a - href="http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=15418">Click + various bugs. It is a recommended update for all users. <a + href="http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=16448">Click here to see the change details.</a> </p> </div> -<!-- -<div style="background-color:#ffff80;color:#000000;font-size:80%;"> - <h1>FETCHMAIL 6.2.X UNSUPPORTED AND VULNERABLE - USE 6.3.X INSTEAD</h1> - <p>fetchmail 6.2.X versions are susceptible to CVE-2006-5867 and CVE-2007-1558 and should be replaced by the most current 6.3.X version. Support has been discontinued as of 2006-01-22.</p> -</div> ---> - - <div style="background-color:#ffe0c0;color:#000000;font-size:85%"> <h1>SECURITY ALERTS</h1> <p style="font-size:100%">These security issues (listed immediately below) have become known to the fetchmail maintainer to the date mentioned above. Note @@ -82,7 +74,9 @@ href="http://mandree.home.pages.de/fetchmail/">fetchmail-6.3.6-rc5 was released< <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335">CVE-2005-2335:</a> Fetchmail was found to contain a <a href="fetchmail-SA-2005-01.txt">remotely exploitable code injection vulnerability (potentially privileged code)</a> in the POP3 code, affecting both the 6.2.0 and 6.2.5 releases. 6.2.5.2, 6.2.5.4 and 6.3.0 have got this bug fixed. (Other versions have not been checked if they contain this bug.)</li> </ul> -<p style="font-size:100%"><strong>Please <a href="http://developer.berlios.de/project/showfiles.php?group_id=1824">update to fetchmail version 6.3.9</a>.</strong></p> +<p style="font-size:100%"><strong>Please <a + href="http://developer.berlios.de/project/showfiles.php?group_id=1824">update + to fetchmail version 6.3.10</a>.</strong></p> </div> |