diff --git a/chapter03/patches.xml b/chapter03/patches.xml
index 7875036f2..bd07b2ec8 100644
--- a/chapter03/patches.xml
+++ b/chapter03/patches.xml
@@ -107,6 +107,13 @@ following:
+
+Linux 2.6.10 Security Vulnerability Patch - 1 KB:
+
+
+
+
+
Man 80-Columns Patch - 1 KB:
diff --git a/chapter08/kernel.xml b/chapter08/kernel.xml
index 1d41e21b7..01bac036b 100644
--- a/chapter08/kernel.xml
+++ b/chapter08/kernel.xml
@@ -23,15 +23,16 @@
Installation of the kernel
+Kernel version 2.6.10 has a security vulnerability that will allow user
+processes to gain root privledges upon loading of a kernel module. See:
+ for more information. The following patch fixes this problem:
+
+patch -Np1 -i ../linux-&linux-version;-security_fix-1.patch
+
Prepare for compilation by running the following command:
make mrproper
-Also, ensure that the kernel does not attempt to pass hotplugging events
-to userspace until userspace specifies that it is ready:
-
-sed -i 's@/sbin/hotplug@/bin/true@' kernel/kmod.c
-
If, in , you decided you want
to compile the keymap into the kernel, issue the command below: