On Thu, Mar 2, 2017 at 9:09 AM, Mike Pagano <mpag...@gentoo.org> wrote: > This patch will add some additional text to bring some additional notice > to users > about the security considerations of a specific kernel and direct them > to the > upstream website for further information. See bug #599454 > > Signed-off-by: Mike Pagano <mpag...@gentoo.org> > --- > eclass/kernel-2.eclass | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/eclass/kernel-2.eclass b/eclass/kernel-2.eclass > index e95ec07..2aaab58 100644 > --- a/eclass/kernel-2.eclass > +++ b/eclass/kernel-2.eclass > @@ -1054,6 +1054,12 @@ postinst_sources() { > # And now the general message. > if [[ -n ${K_SECURITY_UNSUPPORTED} ]]; then > ewarn "This means that it is likely to be vulnerable to recent > security issues." > + echo > + ewarn "Upstream kernel developers recommend always running > the latest " > + ewarn "release of any current long term supported Linux > kernel version." > + ewarn "To see a list of these versions, their most current > release and " > + ewarn "long term support status, please go to > https://www.kernel.org ." > + echo > ewarn "For specific information on why this kernel is > unsupported, > please read:" > ewarn "https://wiki.gentoo.org/wiki/Project:Kernel_Security" > fi > -- > 2.10.2 > >
looks like a nice idea. +1 -- アリス フェッラッツィ Alice Ferrazzi Gentoo Kernel Project Leader Mail: Alice Ferrazzi <ali...@gentoo.org> PGP: 2E4E 0856 461C 0585 1336 F496 5621 A6B2 8638 781A