{'title': 'Contributors', 'link':'/community/contributors/'},
{'title': 'Mailing Lists', 'link':'/community/lists/', 'submenu': [
{'title': 'Subscribe', 'link':'/community/lists/subscribe/'},
- {'title': 'Archives', 'link':'http://archives.postgresql.org/'},
+ {'title': 'Archives', 'link':'/list/'},
]},
{'title': 'IRC', 'link':'/community/irc/'},
{'title': 'Featured Users', 'link':'/about/users/'},
<h3>Archives</h3>
-<p>Before posting to a list, you may wish to search the <a href="http://archives.postgresql.org">archives</a>.</p>
+<p>Before posting to a list, you may wish to search the <a href="/list/">archives</a>.</p>
<p>The mailing lists are also available at the PostgreSQL <a href="news://news.postgresql.org">news server</a>.
However, in order to post to a list, you must still subscribe to that list (but it is possible to subscribe without
{%endifchanged%}
<tr>
- <td class="colFirst"><a href="http://archives.postgresql.org/{{l.listname}}/">{{l.maybe_shortdesc}}</a></td>
+ <td class="colFirst"><a href="/list/{{l.listname}}/">{{l.maybe_shortdesc}}</a></td>
<td class="colLast">{{l.description|safe}}</td>
</tr>
{%endfor%}
</tr>
<tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0553">CVE-2006-0553</a><br/><a href="http://archives.postgresql.org/pgsql-announce/2006-02/msg00008.php">Announcement</a></td>
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0553">CVE-2006-0553</a><br/><a href="/message-id/20060214111455.V60635@ganymede.hub.org">Announcement</a></td>
<td class="colMid">8.1</td>
<td class="colMid">8.1.3</td>
</tr>
<tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0678">CVE-2006-0678</a><br/><a href="http://archives.postgresql.org/pgsql-announce/2006-02/msg00008.php">Announcement</a></td>
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0678">CVE-2006-0678</a><br/><a href="/message-id/20060214111455.V60635@ganymede.hub.org">Announcement</a></td>
<td class="colMid">8.0, 7.4, 7.3</td>
<td class="colMid">8.0.7, 7.4.12, 7.3.14</td>
</tr>
<tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0105">CVE-2006-0105</a><br/><a href="http://archives.postgresql.org/pgsql-announce/2006-01/msg00001.php">Announcement</a></td>
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0105">CVE-2006-0105</a><br/><a href="/message-id/20060109022952.F1088@ganymede.hub.org">Announcement</a></td>
<td class="colMid">8.1, 8.0</td>
<td class="colMid">8.1.2, 8.0.6</td>
<td class="colMid">core server, win32 only</td>
</tr>
<tr valign="top">
- <td class="colFirst"><a href="http://archives.postgresql.org/pgsql-announce/2006-01/msg00001.php">Announcement</a></td>
+ <td class="colFirst"><a href="/message-id/20060109022952.F1088@ganymede.hub.org">Announcement</a></td>
<td class="colMid">8.1, 8.0, 7.4, 7.3</td>
<td class="colMid">8.1.2, 8.0.6, 7.4.11, 7.3.13</td>
<tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1410">CVE-2005-1410</a><br/><a href="http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php">Announcement</a></td>
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1410">CVE-2005-1410</a><br/><a href="/message-id/2369.1115064398@sss.pgh.pa.us">Announcement</a></td>
<td class="colMid">8.0, 7.4</td>
<td class="colMid">8.0.3, 7.4.8</td>
<td class="colMid">contrib module</td>
<td class="colMid">D</td>
- <td class="colLast">The tsearch2 contrib module declares several functions as internal even though they don't take an internal argument. This allows attackers to cause a denial of service and may possibly have other impacts. A valid login is required to exploit this vulnerability.<br/>Note! See the <a href="http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php">announcement</a> for special upgrade instructions.</td>
+ <td class="colLast">The tsearch2 contrib module declares several functions as internal even though they don't take an internal argument. This allows attackers to cause a denial of service and may possibly have other impacts. A valid login is required to exploit this vulnerability.<br/>Note! See the <a href="/message-id/2369.1115064398@sss.pgh.pa.us">announcement</a> for special upgrade instructions.</td>
</tr>
<tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1409">CVE-2005-1409</a><br/><a href="http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php">Announcement</a></td>
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1409">CVE-2005-1409</a><br/><a href="/message-id/2369.1115064398@sss.pgh.pa.us">Announcement</a></td>
<td class="colMid">8.0, 7.4, 7.3</td>
<td class="colMid">8.0.3, 7.4.8, 7.3.10</td>
<td class="colMid">core server</td>
<td class="colMid">D</td>
- <td class="colLast">Public EXECUTE access is given to certain character conversion functions that are not designed to be safe against malicious arguments. This can cause at least a denial of service. A valid login is required to exploit this vulnerability.<br/>Note! See the <a href="http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php">announcement</a> for special upgrade instructions.</td>
+ <td class="colLast">Public EXECUTE access is given to certain character conversion functions that are not designed to be safe against malicious arguments. This can cause at least a denial of service. A valid login is required to exploit this vulnerability.<br/>Note! See the <a href="/message-id/2369.1115064398@sss.pgh.pa.us">announcement</a> for special upgrade instructions.</td>
</tr>
<tr valign="top">