Ralf Wildenhues <[EMAIL PROTECTED]> writes:

> * Ben Pfaff wrote on Sun, Mar 04, 2007 at 09:29:53PM CET:
>> Bruno Haible <[EMAIL PROTECTED]> writes:
>>
>> > If we recommend to use
>> >
>> >     ./configure --enable-relocatable --prefix=/etc
>> >     make
>> >     make install DESTDIR=/tmp/inst$$
>> >
>> > then there should not be a security problem any more, right?
>>
>> I tend to just use --prefix=$HOME/inst$$.
>
> FWIW, I like that better, too.  Or use some other path that only root
> can write to, like /opt or /nonexistent.

Here's some suggested wording then:

--- relocatable.texi.~1.3.~     2007-03-03 12:23:49.000000000 -0800
+++ relocatable.texi    2007-03-05 11:37:31.000000000 -0800
@@ -24,12 +24,16 @@ To configure a program to be relocatable
 @option{--enable-relocatable} to the @program{configure} command line.
 For reliability, it is best to also give a @option{--prefix} option
 pointing to an otherwise unused (and never used again) directory,
-e.g.@: @option{--prefix=/tmp/inst$$}.  This is recommended because on
+e.g.@: @option{--prefix=$HOME/inst$$} or
[EMAIL PROTECTED]/nonexistent}.  This is recommended because on
 some OSes the executables remember the location of shared libraries
 and prefer them over any other search path.  Therefore, such an
 executable will look for its shared libraries first in the original
 installation directory and only then in the current installation
-directory.
+directory.  Locations writable by unprivileged users, such as
[EMAIL PROTECTED]/tmp/inst$$}, are not recommended because such users can
+re-create a directory with the same name after the original directory
+has been removed.
 
 Installation with @option{--enable-relocatable} will not work for
 setuid or setgid executables, because such executables search only

-- 
"...dans ce pays-ci il est bon de tuer de temps en temps un amiral
 pour encourager les autres."
--Voltaire, _Candide_


Reply via email to