aboutsummaryrefslogtreecommitdiffstats
path: root/chapter08
diff options
context:
space:
mode:
authorJim Gifford <jim@linuxfromscratch.org>2005-03-16 17:32:30 +0000
committerJim Gifford <jim@linuxfromscratch.org>2005-03-16 17:32:30 +0000
commit59f8879700aefd7f32f85710e978055a2ad2eee8 (patch)
treeb47d98a17735903274184b053bf7e40d0e02b0da /chapter08
parentacaf4b2a1173e8f997a8fc729d99765b4c479d87 (diff)
Removed kernel security patch
git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@4764 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
Diffstat (limited to 'chapter08')
-rw-r--r--chapter08/kernel.xml6
1 files changed, 0 insertions, 6 deletions
diff --git a/chapter08/kernel.xml b/chapter08/kernel.xml
index 846532676..ce67657b2 100644
--- a/chapter08/kernel.xml
+++ b/chapter08/kernel.xml
@@ -34,12 +34,6 @@ compilation, and installation. Read the <filename>README</filename>
file in the kernel source tree for alternate methods to the way this
book configures the kernel.</para>
-<para>Kernel version 2.6.10 has a security vulnerability that will allow user
-processes to gain root privledges upon loading of a kernel module. See:
-<ulink url="http://www.uwsg.iu.edu/hypermail/linux/kernel/0412.3/0679.html"/> for more information. The following patch fixes this problem:</para>
-
-<screen><userinput>patch -Np1 -i ../linux-&linux-version;-security_fix-1.patch</userinput></screen>
-
<para>Prepare for compilation by running the following command:</para>
<screen><userinput>make mrproper</userinput></screen>