mirror of
https://git.linuxfromscratch.org/lfs.git
synced 2025-01-18 21:17:38 +00:00
Added the fix for the linux kernel security vulnerability into the build instructions - Thanks Matt for catching this one
git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@4469 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
This commit is contained in:
parent
b17cfc8ce9
commit
1d609dcea7
@ -107,6 +107,13 @@ following:</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
<varlistentry>
|
||||
<term>Linux 2.6.10 Security Vulnerability Patch - 1 KB:</term>
|
||||
<listitem>
|
||||
<para><ulink url="&patches-root;linux-&linux-version;-security_fix-1.patch"/></para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
<varlistentry>
|
||||
<term>Man 80-Columns Patch - 1 KB:</term>
|
||||
<listitem>
|
||||
|
@ -23,15 +23,16 @@
|
||||
<sect2 role="installation">
|
||||
<title>Installation of the kernel</title>
|
||||
|
||||
<para>Kernel version 2.6.10 has a security vulnerability that will allow user
|
||||
processes to gain root privledges upon loading of a kernel module. See:
|
||||
<ulink url="http://www.uwsg.iu.edu/hypermail/linux/kernel/0412.3/0679.html"/> for more information. The following patch fixes this problem:</para>
|
||||
|
||||
<screen><userinput>patch -Np1 -i ../linux-&linux-version;-security_fix-1.patch</userinput></screen>
|
||||
|
||||
<para>Prepare for compilation by running the following command:</para>
|
||||
|
||||
<screen><userinput>make mrproper</userinput></screen>
|
||||
|
||||
<para>Also, ensure that the kernel does not attempt to pass hotplugging events
|
||||
to userspace until userspace specifies that it is ready:</para>
|
||||
|
||||
<screen><userinput>sed -i 's@/sbin/hotplug@/bin/true@' kernel/kmod.c</userinput></screen>
|
||||
|
||||
<para>If, in <xref linkend="ch-scripts-console"/>, you decided you want
|
||||
to compile the keymap into the kernel, issue the command below:</para>
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user