On 03/02/2017 06:56 AM, Alice Ferrazzi wrote:
> On Thu, Mar 2, 2017 at 9:09 AM, Mike Pagano <mpag...@gentoo.org> wrote:
>> This patch will add some additional text to bring some additional notice
>> to users
>> about the security considerations of a specific kernel and direct them
>> to the
>> upstream website for further information.  See bug #599454
>>
>> Signed-off-by: Mike Pagano <mpag...@gentoo.org>
>> ---
>>  eclass/kernel-2.eclass | 6 ++++++
>>  1 file changed, 6 insertions(+)
>>
>> diff --git a/eclass/kernel-2.eclass b/eclass/kernel-2.eclass
>> index e95ec07..2aaab58 100644
>> --- a/eclass/kernel-2.eclass
>> +++ b/eclass/kernel-2.eclass
>> @@ -1054,6 +1054,12 @@ postinst_sources() {
>>         #  And now the general message.
>>         if [[ -n ${K_SECURITY_UNSUPPORTED} ]]; then
>>                 ewarn "This means that it is likely to be vulnerable to 
>> recent
>> security issues."
>> +               echo
>> +               ewarn "Upstream kernel developers recommend always running 
>> the latest "
>> +               ewarn "release of any current long term supported Linux 
>> kernel version."
>> +               ewarn "To see a list of these versions, their most current 
>> release and "
>> +               ewarn "long term support status, please go to 
>> https://www.kernel.org ."
>> +               echo
>>                 ewarn "For specific information on why this kernel is 
>> unsupported,
>> please read:"
>>                 ewarn "https://wiki.gentoo.org/wiki/Project:Kernel_Security";
>>         fi
>> --
>> 2.10.2
>>
>>
> 
> looks like a nice idea.
> +1
> 


Applied

-- 
Mike Pagano
Gentoo Developer - Kernel Project
Gentoo Sources - Lead
E-Mail     : mpag...@gentoo.org
GnuPG FP   : 52CC A0B0 F631 0B17 0142 F83F 92A6 DBEC 81F2 B137
Public Key :
http://http://pgp.mit.edu/pks/lookup?search=0x92A6DBEC81F2B137&op=index


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to