ed-inst.xml 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152
  1. <sect2><title>&nbsp;</title><para>&nbsp;</para></sect2>
  2. <sect2>
  3. <title>Installation of Ed</title>
  4. <note><para>Ed isn't something you would personally use. It's installed here
  5. because it can be used by the patch program if you encounter an ed-based patch
  6. file. This happens rarely because diff-based patches are preferred these
  7. days.</para></note>
  8. <para>This package requires its patch to be applied before you can
  9. install it.</para>
  10. <para><screen><userinput>
  11. patch -Np1 -i ../ed-&ed-patch-version;.patch
  12. </userinput></screen></para>
  13. <para>Prepare Ed to be compiled:</para>
  14. <para><screen><userinput>
  15. ./configure --prefix=/usr</userinput></screen></para>
  16. <para>Continue with compiling the package:</para>
  17. <para><screen><userinput>make</userinput></screen></para>
  18. <para>And finish off installing the package:</para>
  19. <para><screen><userinput>make install</userinput></screen></para>
  20. <para>Move the Ed binaries to the root partition.</para>
  21. <para><screen><userinput>mv /usr/bin/{ed,red} /bin
  22. </userinput></screen></para>
  23. </sect2>
  24. <sect2>
  25. <title>Command explanations</title>
  26. <para><userinput>patch -Np1 -i ../ed-&ed-version;.patch:</userinput> This
  27. patch fixes a symlink vulnerability in ed. The ed executable creates files
  28. in /tmp with predictable names. By using various symlink attacks, it is
  29. possible to have ed write to files it should not, change the permissions
  30. of files, etc.</para>
  31. <para><userinput>mv /usr/bin/{ed,red} /bin:</userinput>
  32. The Ed binaries are moved to the /bin directory so they may be used in
  33. the event that the /usr partition is unavailable.</para>
  34. </sect2>