aboutsummaryrefslogtreecommitdiffstats
path: root/website
diff options
context:
space:
mode:
Diffstat (limited to 'website')
-rw-r--r--website/index.html24
1 files changed, 9 insertions, 15 deletions
diff --git a/website/index.html b/website/index.html
index 7b59e853..90ce8380 100644
--- a/website/index.html
+++ b/website/index.html
@@ -15,7 +15,7 @@
<table width="100%" cellpadding="0" summary="Canned page header">
<tr>
<td>Fetchmail</td>
-<td align="right"><!-- update date -->2008-11-16</td>
+<td align="right"><!-- update date -->2009-07-02</td>
</tr>
</table>
</div>
@@ -46,24 +46,16 @@ href="http://mandree.home.pages.de/fetchmail/">fetchmail-6.3.6-rc5 was released<
-->
<div style="background-color:#c0ffc0;color:#000000;">
- <h1>NEWS: FETCHMAIL 6.3.9 RELEASE</h1>
- <p>On 2008-11-16, <a href="http://developer.berlios.de/project/showfiles.php?group_id=1824">fetchmail-6.3.9
+ <h1>NEWS: FETCHMAIL 6.3.10 RELEASE</h1>
+ <p>On 2009-07-02, <a
+ href="http://developer.berlios.de/project/showfiles.php?group_id=1824">fetchmail-6.3.10
has been released (this is the download link),</a> fixing
- various bugs, among them the security issues CVE-2008-2711 and
- CVE-2007-4565, and two critical bugs. <a
- href="http://developer.berlios.de/project/shownotes.php?group_id=1824&amp;release_id=15418">Click
+ various bugs. It is a recommended update for all users. <a
+ href="http://developer.berlios.de/project/shownotes.php?group_id=1824&amp;release_id=16448">Click
here to see the change details.</a>
</p>
</div>
-<!--
-<div style="background-color:#ffff80;color:#000000;font-size:80%;">
- <h1>FETCHMAIL 6.2.X UNSUPPORTED AND VULNERABLE - USE 6.3.X INSTEAD</h1>
- <p>fetchmail 6.2.X versions are susceptible to CVE-2006-5867 and CVE-2007-1558 and should be replaced by the most current 6.3.X version. Support has been discontinued as of 2006-01-22.</p>
-</div>
--->
-
-
<div style="background-color:#ffe0c0;color:#000000;font-size:85%"> <h1>SECURITY ALERTS</h1>
<p style="font-size:100%">These security issues (listed immediately below) have become
known to the fetchmail maintainer to the date mentioned above. Note
@@ -82,7 +74,9 @@ href="http://mandree.home.pages.de/fetchmail/">fetchmail-6.3.6-rc5 was released<
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335">CVE-2005-2335:</a> Fetchmail was found to contain a <a href="fetchmail-SA-2005-01.txt">remotely exploitable code injection vulnerability (potentially privileged code)</a> in the POP3 code, affecting both the 6.2.0 and 6.2.5 releases. 6.2.5.2, 6.2.5.4 and 6.3.0 have got this bug fixed. (Other versions have not been checked if they contain this bug.)</li>
</ul>
-<p style="font-size:100%"><strong>Please <a href="http://developer.berlios.de/project/showfiles.php?group_id=1824">update to fetchmail version 6.3.9</a>.</strong></p>
+<p style="font-size:100%"><strong>Please <a
+ href="http://developer.berlios.de/project/showfiles.php?group_id=1824">update
+ to fetchmail version 6.3.10</a>.</strong></p>
</div>