Changeset f52ea4e
- Timestamp:
- 01/09/2005 02:17:39 PM (19 years ago)
- Children:
- 50bf600
- Parents:
- 39bcf11a
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
chapter01/changelog.xml
r39bcf11a rf52ea4e 56 56 <listitem><para>Hotplug 2004_09_23</para></listitem> 57 57 <listitem><para>Libol 0.3.14</para></listitem> 58 <listitem><para>linux-2.6.10-security_fix-1.patch</para></listitem> 58 59 <listitem><para>Syslog-ng 1.6.5</para></listitem> 59 60 <listitem><para>util-linux-2.12p-cramfs-1.patch</para></listitem> … … 73 74 </itemizedlist> 74 75 </listitem> 76 77 <listitem><para>January 9, 2005 [matt]: Added a security patch for the kernel</para></listitem> 75 78 76 79 <listitem><para>January 9, 2005 [matt]: Added a security patch for vim</para></listitem> -
chapter03/patches.xml
r39bcf11a rf52ea4e 106 106 107 107 <varlistentry> 108 <term>Linux 2.6.10 Security Vulnerability Patch - 1 KB:</term> 109 <listitem> 110 <para><ulink url="&patches-root;linux-&linux-version;-security_fix-1.patch"/></para> 111 </listitem> 112 </varlistentry> 113 114 <varlistentry> 108 115 <term>Mktemp Tempfile Patch - 3 KB:</term> 109 116 <listitem> -
chapter08/kernel.xml
r39bcf11a rf52ea4e 34 34 file in the kernel source tree for alternate methods to the way this 35 35 book configures the kernel.</para> 36 37 <para>Kernel version 2.6.10 has a security vulnerability that will allow user 38 processes to gain root privledges upon loading of a kernel module. See: 39 <ulink url="http://www.uwsg.iu.edu/hypermail/linux/kernel/0412.3/0679.html"/> for more information. The following patch fixes this problem:</para> 40 41 <screen><userinput>patch -Np1 -i ../linux-&linux-version;-security_fix-1.patch</userinput></screen> 36 42 37 43 <para>Prepare for compilation by running the following command:</para>
Note:
See TracChangeset
for help on using the changeset viewer.