Add Exim 4.98
[exim-website.git] / templates / web / index.xsl
index f121c5178a18b34432f16a4968491a90e63b4e94..33c36cd7f25c343ee923c7c725835485605c9880 100644 (file)
 
                        <h2>Latest Version: <xsl:value-of select="/content/current_version"/></h2>
 
-                       <xsl:text>
-                       Currently we're working on a security release. This will be 4.96.1. Please
-                       see <a href="static/doc/security/CVE-2023-zdi.txt">this document for more detailed information.</a>
-                       </xsl:text>
-
-
                 <!-- Summary -->
                        <p id="summary">
                                <a href="https://www.exim.org/">
 
          <p id="version_info">
             <xsl:text>The current version is </xsl:text> <xsl:value-of select="/content/current_version"/><xsl:text>.</xsl:text> <br/>
-           <xsl:text>If necessary, we publish maintenance releases. These releases are mainly intended for package maintainers.</xsl:text>
+       </p>
 
-           <!--
-           This is a security release.  See <a href="{$staticroot}/doc/security/CVE-2020-qualys">CVE-2020-qualys</a> or
-           <a href="https://www.qualys.com/2021/05/04/21nails/21nails.txt">at the reporter's (Qualys) site</a>.
-           -->
+       <p>
+       <xsl:text>This is a security release. It addresses the SMTP smuggling attack to which SMTP servers may be vulnerable. See </xsl:text>
+       <a href="https://bugs.exim.org/show_bug.cgi?id=3063">our bugtracker (Bug 3063)</a>
+       <xsl:text> for further information. Exim got </xsl:text>
+       <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51766">CVE-2023-51766</a>
+       <xsl:text> assigned for this issue.</xsl:text>
+       </p>
 
-         </p>
+       <p>
+           <xsl:text>If necessary, we publish maintenance releases. These releases are mainly intended for package maintainers.</xsl:text>
+        </p>
+
+        <!--
+         <p>
+           <xsl:text>Currently we're working on a security release. This will be 4.96.1. Please see </xsl:text>
+           <a href="static/doc/security/CVE-2023-zdi.txt">this document for more detailed information.</a>
+       </p>
+       -->
 
          <p id="beta_version_info">
             <xsl:text>There may be beta versions available from the ftp sites in the Testing directory. Many people are using these without problems, but they are not recommended unless you are willing to work with beta software.</xsl:text>