This patch will add some additional text to bring some additional notice to users about the security considerations of a specific kernel and direct them to the upstream website for further information. See bug #599454
Signed-off-by: Mike Pagano <mpag...@gentoo.org> --- eclass/kernel-2.eclass | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/eclass/kernel-2.eclass b/eclass/kernel-2.eclass index e95ec07..2aaab58 100644 --- a/eclass/kernel-2.eclass +++ b/eclass/kernel-2.eclass @@ -1054,6 +1054,12 @@ postinst_sources() { # And now the general message. if [[ -n ${K_SECURITY_UNSUPPORTED} ]]; then ewarn "This means that it is likely to be vulnerable to recent security issues." + echo + ewarn "Upstream kernel developers recommend always running the latest " + ewarn "release of any current long term supported Linux kernel version." + ewarn "To see a list of these versions, their most current release and " + ewarn "long term support status, please go to https://www.kernel.org ." + echo ewarn "For specific information on why this kernel is unsupported, please read:" ewarn "https://wiki.gentoo.org/wiki/Project:Kernel_Security" fi -- 2.10.2
signature.asc
Description: OpenPGP digital signature