Gitweb:
https://git.exim.org/exim-website.git/commitdiff/ec88c2f0e675f8a846eee8da54254ea3a1965571
Commit: ec88c2f0e675f8a846eee8da54254ea3a1965571
Parent: f2092af3e3463c0bf152f4c2acc3212042cd6a4b
Author: Heiko Schlittermann (HS12-RIPE) <hs@???>
AuthorDate: Sat Dec 30 09:44:34 2023 +0100
Committer: Heiko Schlittermann (HS12-RIPE) <hs@???>
CommitDate: Sat Dec 30 09:59:08 2023 +0100
chg: mention CVE for 3.97.1
---
templates/web/index.xsl | 14 +++++++++-----
1 file changed, 9 insertions(+), 5 deletions(-)
diff --git a/templates/web/index.xsl b/templates/web/index.xsl
index 7604d2c..33c36cd 100644
--- a/templates/web/index.xsl
+++ b/templates/web/index.xsl
@@ -47,15 +47,19 @@
<p id="version_info">
<xsl:text>The current version is </xsl:text> <xsl:value-of select="/content/current_version"/><xsl:text>.</xsl:text> <br/>
- <xsl:text>If necessary, we publish maintenance releases. These releases are mainly intended for package maintainers.</xsl:text>
</p>
- <!--
<p>
- <xsl:text>This is a security release. You should upgrade as soon as possible. Please see </xsl:text>
- <a href="static/doc/security/CVE-2023-zdi.txt">this document for more detailed information.</a>
+ <xsl:text>This is a security release. It addresses the SMTP smuggling attack to which SMTP servers may be vulnerable. See </xsl:text>
+ <a href="https://bugs.exim.org/show_bug.cgi?id=3063">our bugtracker (Bug 3063)</a>
+ <xsl:text> for further information. Exim got </xsl:text>
+ <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51766">CVE-2023-51766</a>
+ <xsl:text> assigned for this issue.</xsl:text>
</p>
- -->
+
+ <p>
+ <xsl:text>If necessary, we publish maintenance releases. These releases are mainly intended for package maintainers.</xsl:text>
+ </p>
<!--
<p>
--
## subscription configuration (requires account):
##
https://lists.exim.org/mailman3/postorius/lists/exim-cvs.lists.exim.org/
## unsubscribe (doesn't require an account):
## exim-cvs-unsubscribe@???
## Exim details at
http://www.exim.org/
## Please use the Wiki with this list -
http://wiki.exim.org/