Minor changes to verbiage in chapter 3.2 (All Packages)

This commit is contained in:
David Bryant 2022-09-23 14:57:48 -05:00
parent 50e70dbc1f
commit 81793c6efc

View File

@ -15,14 +15,14 @@
before downloading packages to figure out if a newer version of any before downloading packages to figure out if a newer version of any
package should be used to avoid security vulnerabilities.</para> package should be used to avoid security vulnerabilities.</para>
<para>The upstreams may remove old releases, especially when these <para>The upstream sources may remove old releases, especially when those
releases contain a security vulnerability. If one URL below is not releases contain a security vulnerability. If one URL below is not
reachable, you should read the security advisories first to figure out reachable, you should read the security advisories first to figure out
if a newer version (with the vulnerability fixed) should be used. If if a newer version (with the vulnerability fixed) should be used. If
not, try to download the removed package from a mirror. Although it's not, try to download the removed package from a mirror. Although it's
possible to download an old release from a mirror even if this release possible to download an old release from a mirror even if this release
has been removed because of a vulnerability, it's not recommended to has been removed because of a vulnerability, it's not a good idea to
use a release known to be vulnerable for building your system.</para> use a release known to be vulnerable when building your system.</para>
</note> </note>
<para>Download or otherwise obtain the following packages:</para> <para>Download or otherwise obtain the following packages:</para>
@ -453,7 +453,7 @@
<para>MD5 sum: <literal>&linux-md5;</literal></para> <para>MD5 sum: <literal>&linux-md5;</literal></para>
<note> <note>
<para>The Linux kernel is updated relatively often, many times due to <para>The Linux kernel is updated quite frequently, many times due to
discoveries of security vulnerabilities. The latest available discoveries of security vulnerabilities. The latest available
<!--&linux-major-version;.&linux-minor-version;.x--> stable kernel <!--&linux-major-version;.&linux-minor-version;.x--> stable kernel
version <!--should--> may be version <!--should--> may be