12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152 |
- <sect2><title> </title><para> </para></sect2>
- <sect2>
- <title>Installation of Ed</title>
- <note><para>Ed isn't something you would personally use. It's installed here
- because it can be used by the patch program if you encounter an ed-based patch
- file. This happens rarely because diff-based patches are preferred these
- days.</para></note>
- <para>This package requires its patch to be applied before you can
- install it.</para>
- <para><screen><userinput>
- patch -Np1 -i ../ed-&ed-patch-version;.patch
- </userinput></screen></para>
- <para>Prepare Ed to be compiled:</para>
- <para><screen><userinput>
- ./configure --prefix=/usr</userinput></screen></para>
- <para>Continue with compiling the package:</para>
- <para><screen><userinput>make</userinput></screen></para>
- <para>And finish off installing the package:</para>
- <para><screen><userinput>make install</userinput></screen></para>
- <para>Move the Ed binaries to the root partition.</para>
- <para><screen><userinput>mv /usr/bin/{ed,red} /bin
- </userinput></screen></para>
- </sect2>
- <sect2>
- <title>Command explanations</title>
- <para><userinput>patch -Np1 -i ../ed-&ed-version;.patch:</userinput> This
- patch fixes a symlink vulnerability in ed. The ed executable creates files
- in /tmp with predictable names. By using various symlink attacks, it is
- possible to have ed write to files it should not, change the permissions
- of files, etc.</para>
- <para><userinput>mv /usr/bin/{ed,red} /bin:</userinput>
- The Ed binaries are moved to the /bin directory so they may be used in
- the event that the /usr partition is unavailable.</para>
- </sect2>
|