On Thu, Mar 2, 2017 at 9:09 AM, Mike Pagano <mpag...@gentoo.org> wrote:
> This patch will add some additional text to bring some additional notice
> to users
> about the security considerations of a specific kernel and direct them
> to the
> upstream website for further information.  See bug #599454
>
> Signed-off-by: Mike Pagano <mpag...@gentoo.org>
> ---
>  eclass/kernel-2.eclass | 6 ++++++
>  1 file changed, 6 insertions(+)
>
> diff --git a/eclass/kernel-2.eclass b/eclass/kernel-2.eclass
> index e95ec07..2aaab58 100644
> --- a/eclass/kernel-2.eclass
> +++ b/eclass/kernel-2.eclass
> @@ -1054,6 +1054,12 @@ postinst_sources() {
>         #  And now the general message.
>         if [[ -n ${K_SECURITY_UNSUPPORTED} ]]; then
>                 ewarn "This means that it is likely to be vulnerable to recent
> security issues."
> +               echo
> +               ewarn "Upstream kernel developers recommend always running 
> the latest "
> +               ewarn "release of any current long term supported Linux 
> kernel version."
> +               ewarn "To see a list of these versions, their most current 
> release and "
> +               ewarn "long term support status, please go to 
> https://www.kernel.org ."
> +               echo
>                 ewarn "For specific information on why this kernel is 
> unsupported,
> please read:"
>                 ewarn "https://wiki.gentoo.org/wiki/Project:Kernel_Security";
>         fi
> --
> 2.10.2
>
>

looks like a nice idea.
+1

-- 
アリス フェッラッツィ
Alice Ferrazzi

Gentoo Kernel Project Leader
Mail: Alice Ferrazzi <ali...@gentoo.org>
PGP: 2E4E 0856 461C 0585 1336 F496 5621 A6B2 8638 781A

Reply via email to