| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152 | <sect2><title> </title><para> </para></sect2><sect2><title>Installation of Ed</title><note><para>Ed isn't something you would personally use. It's installed herebecause it can be used by the patch program if you encounter an ed-based patchfile. This happens rarely because diff-based patches are preferred thesedays.</para></note><para>This package requires its patch to be applied before you caninstall it.</para><para><screen><userinput>patch -Np1 -i ../ed-&ed-patch-version;.patch</userinput></screen></para><para>Prepare Ed to be compiled:</para><para><screen><userinput>./configure --prefix=/usr</userinput></screen></para><para>Continue with compiling the package:</para><para><screen><userinput>make</userinput></screen></para><para>And finish off installing the package:</para><para><screen><userinput>make install</userinput></screen></para><para>Move the Ed binaries to the root partition.</para><para><screen><userinput>mv /usr/bin/{ed,red} /bin</userinput></screen></para></sect2><sect2><title>Command explanations</title><para><userinput>patch -Np1 -i ../ed-&ed-version;.patch:</userinput> Thispatch fixes a symlink vulnerability in ed. The ed executable creates filesin /tmp with predictable names. By using various symlink attacks, it ispossible to have ed write to files it should not, change the permissionsof files, etc.</para><para><userinput>mv /usr/bin/{ed,red} /bin:</userinput>The Ed binaries are moved to the /bin directory so they may be used inthe event that the /usr partition is unavailable.</para></sect2>
 |