Ralf Wildenhues <[EMAIL PROTECTED]> writes: > * Ben Pfaff wrote on Sun, Mar 04, 2007 at 09:29:53PM CET: >> Bruno Haible <[EMAIL PROTECTED]> writes: >> >> > If we recommend to use >> > >> > ./configure --enable-relocatable --prefix=/etc >> > make >> > make install DESTDIR=/tmp/inst$$ >> > >> > then there should not be a security problem any more, right? >> >> I tend to just use --prefix=$HOME/inst$$. > > FWIW, I like that better, too. Or use some other path that only root > can write to, like /opt or /nonexistent.
Here's some suggested wording then: --- relocatable.texi.~1.3.~ 2007-03-03 12:23:49.000000000 -0800 +++ relocatable.texi 2007-03-05 11:37:31.000000000 -0800 @@ -24,12 +24,16 @@ To configure a program to be relocatable @option{--enable-relocatable} to the @program{configure} command line. For reliability, it is best to also give a @option{--prefix} option pointing to an otherwise unused (and never used again) directory, -e.g.@: @option{--prefix=/tmp/inst$$}. This is recommended because on +e.g.@: @option{--prefix=$HOME/inst$$} or [EMAIL PROTECTED]/nonexistent}. This is recommended because on some OSes the executables remember the location of shared libraries and prefer them over any other search path. Therefore, such an executable will look for its shared libraries first in the original installation directory and only then in the current installation -directory. +directory. Locations writable by unprivileged users, such as [EMAIL PROTECTED]/tmp/inst$$}, are not recommended because such users can +re-create a directory with the same name after the original directory +has been removed. Installation with @option{--enable-relocatable} will not work for setuid or setgid executables, because such executables search only -- "...dans ce pays-ci il est bon de tuer de temps en temps un amiral pour encourager les autres." --Voltaire, _Candide_