diff --git a/chapter03/patches.xml b/chapter03/patches.xml index 7875036f2..bd07b2ec8 100644 --- a/chapter03/patches.xml +++ b/chapter03/patches.xml @@ -107,6 +107,13 @@ following: + +Linux 2.6.10 Security Vulnerability Patch - 1 KB: + + + + + Man 80-Columns Patch - 1 KB: diff --git a/chapter08/kernel.xml b/chapter08/kernel.xml index 1d41e21b7..01bac036b 100644 --- a/chapter08/kernel.xml +++ b/chapter08/kernel.xml @@ -23,15 +23,16 @@ Installation of the kernel +Kernel version 2.6.10 has a security vulnerability that will allow user +processes to gain root privledges upon loading of a kernel module. See: + for more information. The following patch fixes this problem: + +patch -Np1 -i ../linux-&linux-version;-security_fix-1.patch + Prepare for compilation by running the following command: make mrproper -Also, ensure that the kernel does not attempt to pass hotplugging events -to userspace until userspace specifies that it is ready: - -sed -i 's@/sbin/hotplug@/bin/true@' kernel/kmod.c - If, in , you decided you want to compile the keymap into the kernel, issue the command below: