=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/security.html,v retrieving revision 1.264 retrieving revision 1.265 diff -u -r1.264 -r1.265 --- www/security.html 2003/11/18 13:50:35 1.264 +++ www/security.html 2003/12/29 11:59:02 1.265 @@ -246,15 +246,23 @@ may allow an attacker to gain escalated privileges. +

+OpenBSD 3.2 and earlier releases are not supported anymore. The following +paragraphs only list advisories issued while they were maintained; these +releases are likely to be affected by the advisories for more recent releases. +
+

+ +

  • OpenBSD 3.2 Security Advisories

    These are the OpenBSD 3.2 advisories -- all these problems are solved -in OpenBSD current and the -patch branch. - +in OpenBSD current. The +patch branch for 3.2 is no longer being maintained, +you should update your machine.

    -
  • -OpenBSD 3.1 and earlier releases are not supported anymore. The following -paragraphs only list advisories issued while they were maintained; these -releases are likely to be affected by the advisories for more recent releases. -
    - -

    -

    - -

  • @@ -1061,7 +1059,7 @@ carefully). Users can make the assumption that the current source tree always has stronger security than the previous release. However, building your own system from source code is not trivial; - it is nearly 300MB of source code, and problems do occur as we + it is nearly 600MB of source code, and problems do occur as we transition between major releases.
  • Install a binary snapshot for your architecture, which are made available fairly often. For @@ -1131,7 +1129,7 @@ OpenBSD www@openbsd.org
    -$OpenBSD: security.html,v 1.264 2003/11/18 13:50:35 henning Exp $ +$OpenBSD: security.html,v 1.265 2003/12/29 11:59:02 miod Exp $