Changeset 1d609dce


Ignore:
Timestamp:
12/31/2004 06:29:29 AM (19 years ago)
Author:
Jeremy Utley <jeremy@…>
Branches:
10.0, 10.0-rc1, 10.1, 10.1-rc1, 11.0, 11.0-rc1, 11.0-rc2, 11.0-rc3, 11.1, 11.1-rc1, 11.2, 11.2-rc1, 11.3, 11.3-rc1, 12.0, 12.0-rc1, 12.1, 12.1-rc1, 6.1, 6.1.1, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 7.0, 7.1, 7.2, 7.3, 7.4, 7.5, 7.5-systemd, 7.6, 7.6-systemd, 7.7, 7.7-systemd, 7.8, 7.8-systemd, 7.9, 7.9-systemd, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, arm, bdubbs/gcc13, ml-11.0, multilib, renodr/libudev-from-systemd, s6-init, trunk, xry111/arm64, xry111/arm64-12.0, xry111/clfs-ng, xry111/lfs-next, xry111/loongarch, xry111/loongarch-12.0, xry111/loongarch-12.1, xry111/mips64el, xry111/pip3, xry111/rust-wip-20221008, xry111/update-glibc
Children:
cd15a38a
Parents:
b17cfc8c
Message:

Added the fix for the linux kernel security vulnerability into the build instructions - Thanks Matt for catching this one

git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@4469 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689

Files:
2 edited

Legend:

Unmodified
Added
Removed
  • chapter03/patches.xml

    rb17cfc8c r1d609dce  
    109109
    110110<varlistentry>
     111<term>Linux 2.6.10 Security Vulnerability Patch - 1 KB:</term>
     112<listitem>
     113<para><ulink url="&patches-root;linux-&linux-version;-security_fix-1.patch"/></para>
     114</listitem>
     115</varlistentry>
     116
     117<varlistentry>
    111118<term>Man 80-Columns Patch - 1 KB:</term>
    112119<listitem>
  • chapter08/kernel.xml

    rb17cfc8c r1d609dce  
    2424<title>Installation of the kernel</title>
    2525
     26<para>Kernel version 2.6.10 has a security vulnerability that will allow user
     27processes to gain root privledges upon loading of a kernel module.  See:
     28<ulink url="http://www.uwsg.iu.edu/hypermail/linux/kernel/0412.3/0679.html"/> for more information.  The following patch fixes this problem:</para>
     29
     30<screen><userinput>patch -Np1 -i ../linux-&linux-version;-security_fix-1.patch</userinput></screen>
     31
    2632<para>Prepare for compilation by running the following command:</para>
    2733
    2834<screen><userinput>make mrproper</userinput></screen>
    29 
    30 <para>Also, ensure that the kernel does not attempt to pass hotplugging events
    31 to userspace until userspace specifies that it is ready:</para>
    32 
    33 <screen><userinput>sed -i 's@/sbin/hotplug@/bin/true@' kernel/kmod.c</userinput></screen>
    3435
    3536<para>If, in <xref linkend="ch-scripts-console"/>, you decided you want
Note: See TracChangeset for help on using the changeset viewer.