diff options
author | Jim Gifford <jim@linuxfromscratch.org> | 2005-03-16 17:32:30 +0000 |
---|---|---|
committer | Jim Gifford <jim@linuxfromscratch.org> | 2005-03-16 17:32:30 +0000 |
commit | 59f8879700aefd7f32f85710e978055a2ad2eee8 (patch) | |
tree | b47d98a17735903274184b053bf7e40d0e02b0da /chapter08 | |
parent | acaf4b2a1173e8f997a8fc729d99765b4c479d87 (diff) |
Removed kernel security patch
git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@4764 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
Diffstat (limited to 'chapter08')
-rw-r--r-- | chapter08/kernel.xml | 6 |
1 files changed, 0 insertions, 6 deletions
diff --git a/chapter08/kernel.xml b/chapter08/kernel.xml index 846532676..ce67657b2 100644 --- a/chapter08/kernel.xml +++ b/chapter08/kernel.xml @@ -34,12 +34,6 @@ compilation, and installation. Read the <filename>README</filename> file in the kernel source tree for alternate methods to the way this book configures the kernel.</para> -<para>Kernel version 2.6.10 has a security vulnerability that will allow user -processes to gain root privledges upon loading of a kernel module. See: -<ulink url="http://www.uwsg.iu.edu/hypermail/linux/kernel/0412.3/0679.html"/> for more information. The following patch fixes this problem:</para> - -<screen><userinput>patch -Np1 -i ../linux-&linux-version;-security_fix-1.patch</userinput></screen> - <para>Prepare for compilation by running the following command:</para> <screen><userinput>make mrproper</userinput></screen> |