This patch will add some additional text to bring some additional notice
to users
about the security considerations of a specific kernel and direct them
to the
upstream website for further information.  See bug #599454

Signed-off-by: Mike Pagano <mpag...@gentoo.org>
---
 eclass/kernel-2.eclass | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/eclass/kernel-2.eclass b/eclass/kernel-2.eclass
index e95ec07..2aaab58 100644
--- a/eclass/kernel-2.eclass
+++ b/eclass/kernel-2.eclass
@@ -1054,6 +1054,12 @@ postinst_sources() {
        #  And now the general message.
        if [[ -n ${K_SECURITY_UNSUPPORTED} ]]; then
                ewarn "This means that it is likely to be vulnerable to recent
security issues."
+               echo
+               ewarn "Upstream kernel developers recommend always running the 
latest "
+               ewarn "release of any current long term supported Linux kernel 
version."
+               ewarn "To see a list of these versions, their most current 
release and "
+               ewarn "long term support status, please go to 
https://www.kernel.org ."
+               echo
                ewarn "For specific information on why this kernel is 
unsupported,
please read:"
                ewarn "https://wiki.gentoo.org/wiki/Project:Kernel_Security";
        fi
-- 
2.10.2


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to