On 03/02/2017 06:56 AM, Alice Ferrazzi wrote: > On Thu, Mar 2, 2017 at 9:09 AM, Mike Pagano <mpag...@gentoo.org> wrote: >> This patch will add some additional text to bring some additional notice >> to users >> about the security considerations of a specific kernel and direct them >> to the >> upstream website for further information. See bug #599454 >> >> Signed-off-by: Mike Pagano <mpag...@gentoo.org> >> --- >> eclass/kernel-2.eclass | 6 ++++++ >> 1 file changed, 6 insertions(+) >> >> diff --git a/eclass/kernel-2.eclass b/eclass/kernel-2.eclass >> index e95ec07..2aaab58 100644 >> --- a/eclass/kernel-2.eclass >> +++ b/eclass/kernel-2.eclass >> @@ -1054,6 +1054,12 @@ postinst_sources() { >> # And now the general message. >> if [[ -n ${K_SECURITY_UNSUPPORTED} ]]; then >> ewarn "This means that it is likely to be vulnerable to >> recent >> security issues." >> + echo >> + ewarn "Upstream kernel developers recommend always running >> the latest " >> + ewarn "release of any current long term supported Linux >> kernel version." >> + ewarn "To see a list of these versions, their most current >> release and " >> + ewarn "long term support status, please go to >> https://www.kernel.org ." >> + echo >> ewarn "For specific information on why this kernel is >> unsupported, >> please read:" >> ewarn "https://wiki.gentoo.org/wiki/Project:Kernel_Security" >> fi >> -- >> 2.10.2 >> >> > > looks like a nice idea. > +1 >
Applied -- Mike Pagano Gentoo Developer - Kernel Project Gentoo Sources - Lead E-Mail : mpag...@gentoo.org GnuPG FP : 52CC A0B0 F631 0B17 0142 F83F 92A6 DBEC 81F2 B137 Public Key : http://http://pgp.mit.edu/pks/lookup?search=0x92A6DBEC81F2B137&op=index
signature.asc
Description: OpenPGP digital signature