ed-exp.xml 372 B

1234567891011
  1. <sect2>
  2. <title>Command explanations</title>
  3. <para><userinput>patch -Np1 -i ../ed-&ed-version;.patch:</userinput> This
  4. patch fixes a symlink vulnerability in ed. The ed executable creates files
  5. in /tmp with predictable names. By using various symlink attacks, it is
  6. possible to have ed write to files it should not, change the permissions
  7. of files, etc.</para>
  8. </sect2>