www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www planetfeeds.html


From: Jason Self
Subject: www planetfeeds.html
Date: Thu, 7 Nov 2019 09:02:48 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     Jason Self <jxself>     19/11/07 09:02:48

Modified files:
        .              : planetfeeds.html 

Log message:
        Updating planetfeeds.html

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.html?cvsroot=www&r1=1.734&r2=1.735

Patches:
Index: planetfeeds.html
===================================================================
RCS file: /web/www/www/planetfeeds.html,v
retrieving revision 1.734
retrieving revision 1.735
diff -u -b -r1.734 -r1.735
--- planetfeeds.html    4 Nov 2019 14:00:59 -0000       1.734
+++ planetfeeds.html    7 Nov 2019 14:02:48 -0000       1.735
@@ -1,27 +1,24 @@
 <!-- Autogenerated by planetrss.pl 1.19 --><!--#set var="a_close" value="</a>" 
-->
 <p><!--#set var="link"
-value="<a 
href='http://www.fsf.org/blogs/community/last-call-for-free-software-awards-nominations-submit-by-11-6'>"
 --><!--#echo
+value="<a href='http://savannah.gnu.org/forum/forum.php?forum_id=9587'>" 
--><!--#echo
 encoding="none" var="link" -->
-<span class="gnun-split"></span>Last call for Free Software Awards 
nominations: Submit by 11/6<span class="gnun-split"></span><!--#echo 
encoding="none"
+<span class="gnun-split"></span>GNU Health 3.6RC3 available at community 
server &amp; demo database<span class="gnun-split"></span><!--#echo 
encoding="none"
 var="a_close" --><span class="gnun-split"></span><!-- TRANSLATORS: 
-http://www.fsf.org/blogs/community/last-call-for-free-software-awards-nominations-submit-by-11-6
 -->:
- The nomination period for the Free Software Foundation (FSF)&#39;s annual Free
-Software Awards is drawing to a close on Novembe...
+http://savannah.gnu.org/forum/forum.php?forum_id=9587 -->:
+ Dear community The Release Candidate 3 (RC3) for the upcoming GNU Health 3.6 
has been installed in the community server. Y...
 </p>
 <p><!--#set var="link"
-value="<a href='https://gnunet.org/#gnunet-0.11.8-release'>" --><!--#echo
+value="<a href='http://savannah.gnu.org/forum/forum.php?forum_id=9586'>" 
--><!--#echo
 encoding="none" var="link" -->
-<span class="gnun-split"></span>GNUnet 0.11.8 released<span 
class="gnun-split"></span><!--#echo encoding="none"
+<span class="gnun-split"></span>Version 3.8<span 
class="gnun-split"></span><!--#echo encoding="none"
 var="a_close" --><span class="gnun-split"></span><!-- TRANSLATORS: 
-https://gnunet.org/#gnunet-0.11.8-release -->:
- 2019-10-30: GNUnet 0.11.8 released We are pleased to announce the release of 
GNUnet 0.11.8. This is a hotfix release for 0.11.7. <i>As always:</i> In terms 
of usabilit...
+http://savannah.gnu.org/forum/forum.php?forum_id=9586 -->:
+ Version 3.8 of GNU mailutils is available for download. This version fixes 
important security flow. The maidag utility has been withdrawn and three new 
programs have been include...
 </p>
 <p><!--#set var="link"
-value="<a 
href='http://www.fsf.org/blogs/community/idad-2019-thank-you-for-defending-the-right-to-read'>"
 --><!--#echo
+value="<a href='http://savannah.gnu.org/forum/forum.php?forum_id=9585'>" 
--><!--#echo
 encoding="none" var="link" -->
-<span class="gnun-split"></span>IDAD 2019: Thank you for defending the right 
to read!<span class="gnun-split"></span><!--#echo encoding="none"
+<span class="gnun-split"></span>Version 2.13<span 
class="gnun-split"></span><!--#echo encoding="none"
 var="a_close" --><span class="gnun-split"></span><!-- TRANSLATORS: 
-http://www.fsf.org/blogs/community/idad-2019-thank-you-for-defending-the-right-to-read
 -->:
- Now that the dust has settled and we have made our voices heard, we would like
-to give a sincere thanks to everyone who helped to make t...
-</p>
\ No newline at end of file
+http://savannah.gnu.org/forum/forum.php?forum_id=9585 -->:
+ GNU cpio version 2.13 is available for download. This version fixes the 
following vulnerabilities: CVE-2015-1197, CVE-2016-2037, CVE-2019-14866.</p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]