Added the fix for the linux kernel security vulnerability into the build instructions - Thanks Matt for catching this one

git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@4469 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
This commit is contained in:
Jeremy Utley 2004-12-31 06:29:29 +00:00
parent b17cfc8ce9
commit 1d609dcea7
2 changed files with 13 additions and 5 deletions

View File

@ -107,6 +107,13 @@ following:</para>
</listitem>
</varlistentry>
<varlistentry>
<term>Linux 2.6.10 Security Vulnerability Patch - 1 KB:</term>
<listitem>
<para><ulink url="&patches-root;linux-&linux-version;-security_fix-1.patch"/></para>
</listitem>
</varlistentry>
<varlistentry>
<term>Man 80-Columns Patch - 1 KB:</term>
<listitem>

View File

@ -23,15 +23,16 @@
<sect2 role="installation">
<title>Installation of the kernel</title>
<para>Kernel version 2.6.10 has a security vulnerability that will allow user
processes to gain root privledges upon loading of a kernel module. See:
<ulink url="http://www.uwsg.iu.edu/hypermail/linux/kernel/0412.3/0679.html"/> for more information. The following patch fixes this problem:</para>
<screen><userinput>patch -Np1 -i ../linux-&linux-version;-security_fix-1.patch</userinput></screen>
<para>Prepare for compilation by running the following command:</para>
<screen><userinput>make mrproper</userinput></screen>
<para>Also, ensure that the kernel does not attempt to pass hotplugging events
to userspace until userspace specifies that it is ready:</para>
<screen><userinput>sed -i 's@/sbin/hotplug@/bin/true@' kernel/kmod.c</userinput></screen>
<para>If, in <xref linkend="ch-scripts-console"/>, you decided you want
to compile the keymap into the kernel, issue the command below:</para>