Hello Ralf,
> > > > for example, --prefix=/tmp/inst$$.
> > >
> > > This bit doesn't. Since /tmp is usually world-writable, you've got your
> > > attack vector already.
> ... So after you've installed
> your stuff, at some point /tmp/inst$$ is removed again (possibly even by
> you). At that time, I can write to /tmp/inst$$. I can usually even
> look at your binaries (in the final location) first to find out about
> the value of $$ that was used by you at 'make install' time.
>
> That's a trivial attack on the systems where run path overrides the
> shared library path variable.
Thanks for explaining. It's not trivial - you have to know a bit about
LD_LIBRARY_PATH, -rpath, LD_RUN_PATH and the like, in order to understand it.
If we recommend to use
./configure --enable-relocatable --prefix=/etc
make
make install DESTDIR=/tmp/inst$$
then there should not be a security problem any more, right?
Bruno