===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/security.html,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -r1.264 -r1.265
--- www/security.html 2003/11/18 13:50:35 1.264
+++ www/security.html 2003/12/29 11:59:02 1.265
@@ -246,15 +246,23 @@
may allow an attacker to gain escalated privileges.
+
+OpenBSD 3.2 and earlier releases are not supported anymore. The following
+paragraphs only list advisories issued while they were maintained; these
+releases are likely to be affected by the advisories for more recent releases.
+
+
+
+
OpenBSD 3.2 Security Advisories
These are the OpenBSD 3.2 advisories -- all these problems are solved
-in OpenBSD current and the
-patch branch.
-
+in OpenBSD current. The
+patch branch for 3.2 is no longer being maintained,
+you should update your machine.
-
-OpenBSD 3.1 and earlier releases are not supported anymore. The following
-paragraphs only list advisories issued while they were maintained; these
-releases are likely to be affected by the advisories for more recent releases.
-
-
-
-
-
-
@@ -1061,7 +1059,7 @@
carefully). Users can make the assumption that the current
source tree always has stronger security than the previous release.
However, building your own system from source code is not trivial;
- it is nearly 300MB of source code, and problems do occur as we
+ it is nearly 600MB of source code, and problems do occur as we
transition between major releases.
Install a binary snapshot for your
architecture, which are made available fairly often. For
@@ -1131,7 +1129,7 @@
www@openbsd.org
-$OpenBSD: security.html,v 1.264 2003/11/18 13:50:35 henning Exp $
+$OpenBSD: security.html,v 1.265 2003/12/29 11:59:02 miod Exp $