from small one page howto to huge articles all in one place
 

search text in:




Other .linuxhowtos.org sites: www.linuxhowtos.org
toolsntoys.linuxhowtos.org



Last additions:
How to make X listen on port 6000

How to make X listen on port 6000

words:

34

views:

39739

userrating:

average rating: 1.5 (4 votes) (1=very good 6=terrible)


May, 25th 2007:
April, 26th 2007:
Apr, 10th. 2007:
Druckversion . pdf icon
You are here: Portage


Details of www-servers/nginx:

Description: Robust, small and high performance http and reverse proxy server
Homepage:
https://nginx.org

available versions:

releasesalphaamd64armhppaia64mipsppcppc64ppc macoss390shsparcx86USE-Flagsdependenciesebuild warnings
nginx-1.13.7 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.13.6-r1 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.13.6 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.13.5 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.13.4 -~~---~-----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.13.3 -~~---~-----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.12.2-r1 -~~---~-----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.12.2 -~~---~-----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.12.1 -+~---~-----+$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
Legend:
+ stable
~ testing
- not available
some ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown.


back
Please read "Why adblockers are bad".



other Ads
Trace My Cash
Wenn Sie sich schon immer mal gefragt haben, wo eigentlich Ihr geliebtes Bargeld geblieben ist, finden Sie hier vielleicht die Antwort.
www.tracemycash.com
Other free services
toURL.org
Shorten long
URLs to short
links like
http://tourl.org/2
tourl.org
.
Reverse DNS lookup
Find out which hostname(s)
resolve to a
given IP or other hostnames for the server
www.reversednslookup.org

New Packages

- as rdf newsfeed
- as rss newsfeed
- as Atom newsfeed
2017-12-12
Net-Pcap - 0.180.0
Ebuild name:

dev-perl/Net-Pcap-0.180.0

Description

Interface to the pcap(3) LBL packet capture library

Added to portage

2017-12-12

Net-SMTP-SSL - 1.40.0
Ebuild name:

dev-perl/Net-SMTP-SSL-1.40.0

Description

(Deprecated) SSL support for Net

Added to portage

2017-12-12

Net-SMTPS - 0.90.0
Ebuild name:

dev-perl/Net-SMTPS-0.90.0

Description

SSL/STARTTLS support for Net

Added to portage

2017-12-12

Net-SSH-Any - 0.100.0
Ebuild name:

dev-perl/Net-SSH-Any-0.100.0

Description

Use any SSH module

Added to portage

2017-12-12

Net-SSH-AuthorizedKeysFile - 0.180.0
Ebuild name:

dev-perl/Net-SSH-AuthorizedKeysFile-0.180.0

Description

Read and modify ssh's authorized_keys files

Added to portage

2017-12-12

Net-SSH-Perl - 2.140.0
Ebuild name:

dev-perl/Net-SSH-Perl-2.140.0

Description

Perl client Interface to SSH

Added to portage

2017-12-12

Net-SSH2 - 0.670.0
Ebuild name:

dev-perl/Net-SSH2-0.670.0

Description

Support for the SSH 2 protocol via libssh2

Added to portage

2017-12-12

clisp - 2.49.60
Ebuild name:

dev-lisp/clisp-2.49.60

Description

A portable, bytecode-compiled implementation of Common Lisp

Added to portage

2017-12-12

discord-bin - 0.0.3
Ebuild name:

net-im/discord-bin-0.0.3

Description

All-in-one voice and text chat for gamers

Added to portage

2017-12-12

docker-compose - 1.18.0_rc2
Ebuild name:

app-emulation/docker-compose-1.18.0_rc2

Description

Multi-container orchestration for Docker

Added to portage

2017-12-12

heimdal - 7.5.0
Ebuild name:

app-crypt/heimdal-7.5.0

Description

Kerberos 5 implementation from KTH

Added to portage

2017-12-12

lastpass-binary-component - 4.1.44_p20171210
Ebuild name:

app-admin/lastpass-binary-component-4.1.44_p20171210

Description

Binary component required by the LastPass Pass

Added to portage

2017-12-12

libewf - 20140608-r1
Ebuild name:

app-forensics/libewf-20140608-r1

Description

Implementation of the EWF (SMART and EnCase) image format

Added to portage

2017-12-12

libmicrohttpd - 0.9.58
Ebuild name:

net-libs/libmicrohttpd-0.9.58

Description

Small C library to run an HTTP server as part of another application

Added to portage

2017-12-12

nfdump - 1.6.16
Ebuild name:

net-analyzer/nfdump-1.6.16

Description

A set of tools to collect and process netflow data

Added to portage

2017-12-12

openafs - 1.6.22
Ebuild name:

net-fs/openafs-1.6.22

Description

The OpenAFS distributed file system

Added to portage

2017-12-12

openafs-kernel - 1.6.22
Ebuild name:

net-fs/openafs-kernel-1.6.22

Description

The OpenAFS distributed file system kernel module

Added to portage

2017-12-12

pathutil - 0.16.1
Ebuild name:

dev-ruby/pathutil-0.16.1

Description

Like Pathname but a little less insane

Added to portage

2017-12-12

unoconv - 0.8.2
Ebuild name:

app-office/unoconv-0.8.2

Description

Convert between document formats supported by Libreoffice

Added to portage

2017-12-12

2017-12-11
aiosmtpd - 1.0
Ebuild name:

dev-python/aiosmtpd-1.0

Description

asyncio based SMTP server

Added to portage

2017-12-11

aiosmtpd - 1.1
Ebuild name:

dev-python/aiosmtpd-1.1

Description

asyncio based SMTP server

Added to portage

2017-12-11

atpublic - 1.0
Ebuild name:

dev-python/atpublic-1.0

Description

A decorator and function to polulate a module's __all__ and the module glob

Added to portage

2017-12-11

aufs-sources - 4.14.4
Ebuild name:

sys-kernel/aufs-sources-4.14.4

Description

Full sources (incl. Gentoo patchset) for the linux kernel tree and a

Added to portage

2017-12-11

aufs-sources - 4.14.5
Ebuild name:

sys-kernel/aufs-sources-4.14.5

Description

Full sources (incl. Gentoo patchset) for the linux kernel tree and a

Added to portage

2017-12-11

aufs-sources - 4.4.104
Ebuild name:

sys-kernel/aufs-sources-4.4.104

Description

Full sources (incl. Gentoo patchset) for the linux kernel tree and

Added to portage

2017-12-11

aufs-sources - 4.4.105
Ebuild name:

sys-kernel/aufs-sources-4.4.105

Description

Full sources (incl. Gentoo patchset) for the linux kernel tree and

Added to portage

2017-12-11

aufs-sources - 4.9.67
Ebuild name:

sys-kernel/aufs-sources-4.9.67

Description

Full sources (incl. Gentoo patchset) for the linux kernel tree and a

Added to portage

2017-12-11

aufs-sources - 4.9.68
Ebuild name:

sys-kernel/aufs-sources-4.9.68

Description

Full sources (incl. Gentoo patchset) for the linux kernel tree and a

Added to portage

2017-12-11

bareos - 16.2.7
Ebuild name:

app-backup/bareos-16.2.7

Description

Featureful client/server network backup suite

Added to portage

2017-12-11

batctl - 2017.4
Ebuild name:

net-misc/batctl-2017.4

Description

BATMAN advanced control and management tool

Added to portage

2017-12-11

batman-adv - 2017.4
Ebuild name:

net-misc/batman-adv-2017.4

Description

Better approach to mobile Ad-Hoc networking on layer 2 kernel module

Added to portage

2017-12-11

cachedir - 1.4
Ebuild name:

app-backup/cachedir-1.4

Description

Tag/untag cache directories

Added to portage

2017-12-11

cadvisor - 0.28.3
Ebuild name:

app-emulation/cadvisor-0.28.3

Description

Analyzes resource usage and performance characteristics of running co

Added to portage

2017-12-11

ck-sources - 4.14.5
Ebuild name:

sys-kernel/ck-sources-4.14.5

Description

Con Kolivas' high performance patchset and Gentoo's genpatches for Lin

Added to portage

2017-12-11

ck-sources - 4.9.68
Ebuild name:

sys-kernel/ck-sources-4.9.68

Description

Con Kolivas' high performance patchset and Gentoo's genpatches for Lin

Added to portage

2017-12-11

dbus-broker - 9
Ebuild name:

sys-apps/dbus-broker-9

Description

Linux D-Bus Message Broker

Added to portage

2017-12-11

eselect-package-manager - 20110108-r1
Ebuild name:

app-eselect/eselect-package-manager-20110108-r1

Description

Manages PACKAGE_MANAGER environment variable

Added to portage

2017-12-11

eselect-php - 0.9.4-r5
Ebuild name:

app-eselect/eselect-php-0.9.4-r5

Description

PHP eselect module

Added to portage

2017-12-11

falcon - 1.3.0
Ebuild name:

dev-python/falcon-1.3.0

Description

A supersonic micro-framework for building cloud APIs

Added to portage

2017-12-11

firefox - 52.5.2
Ebuild name:

www-client/firefox-52.5.2

Description

Firefox Web Browser

Added to portage

2017-12-11

firefox-bin - 52.5.2
Ebuild name:

www-client/firefox-bin-52.5.2

Description

Firefox Web Browser

Added to portage

2017-12-11

flufl-bounce - 3.0
Ebuild name:

dev-python/flufl-bounce-3.0

Description

Email bounce detectors.

Added to portage

2017-12-11

flufl-i18n - 2.0.1
Ebuild name:

dev-python/flufl-i18n-2.0.1

Description

A high level API for Python internationalization.

Added to portage

2017-12-11

flufl-lock - 3.2
Ebuild name:

dev-python/flufl-lock-3.2

Description

NFS-safe file locking with timeouts for POSIX systems.

Added to portage

2017-12-11

geda - 1.9.2-r1
Ebuild name:

sci-electronics/geda-1.9.2-r1

Description

GPL Electronic Design Automation (gEDA) core package

Added to portage

2017-12-11

git-sources - 4.15_rc3
Ebuild name:

sys-kernel/git-sources-4.15_rc3

Description

The very latest -git version of the Linux kernel

Added to portage

2017-12-11

gitea - 1.3.1
Ebuild name:

www-apps/gitea-1.3.1

Description

A painless self-hosted Git service, written in Go

Added to portage

2017-12-11

graphicsmagick - 1.3.27
Ebuild name:

media-gfx/graphicsmagick-1.3.27

Description

Collection of tools and libraries for many image formats

Added to portage

2017-12-11

helm - 2.7.2-r3
Ebuild name:

app-admin/helm-2.7.2-r3

Description

Kubernetes Package Manager

Added to portage

2017-12-11

java-sdk-docs - 9.0.1
Ebuild name:

dev-java/java-sdk-docs-9.0.1

Description

Oracle's documentation bundle (including API) for Java SE

Added to portage

2017-12-11

jdbc-mssqlserver - 6.2.2
Ebuild name:

dev-java/jdbc-mssqlserver-6.2.2

Description

JDBC driver for Microsoft SQL Server

Added to portage

2017-12-11

jenkins-bin - 2.89.1
Ebuild name:

dev-util/jenkins-bin-2.89.1

Description

Extensible continuous integration server

Added to portage

2017-12-11

kube-apiserver - 1.8.5
Ebuild name:

sys-cluster/kube-apiserver-1.8.5

Description

Kubernetes API server

Added to portage

2017-12-11

kube-bench - 0.0.6
Ebuild name:

app-admin/kube-bench-0.0.6

Description

Kubernetes Bench for Security runs the CIS Kubernetes Benchmark

Added to portage

2017-12-11

kube-controller-manager - 1.8.5
Ebuild name:

sys-cluster/kube-controller-manager-1.8.5

Description

Kubernetes Controller Manager

Added to portage

2017-12-11

kube-proxy - 1.8.5
Ebuild name:

sys-cluster/kube-proxy-1.8.5

Description

Kubernetes Proxy service

Added to portage

2017-12-11

kube-scheduler - 1.8.5
Ebuild name:

sys-cluster/kube-scheduler-1.8.5

Description

Kubernetes Controller Manager

Added to portage

2017-12-11

kubectl - 1.8.5
Ebuild name:

sys-cluster/kubectl-1.8.5

Description

CLI to run commands against Kubernetes clusters

Added to portage

2017-12-11

kubelet - 1.8.5
Ebuild name:

sys-cluster/kubelet-1.8.5

Description

Kubernetes Node Agent

Added to portage

2017-12-11

lazr-config - 2.2.1
Ebuild name:

dev-python/lazr-config-2.2.1

Description

Create configuration schemas, and process and validate configurations.

Added to portage

2017-12-11

lazr-delegates - 2.0.4
Ebuild name:

dev-python/lazr-delegates-2.0.4

Description

Easily write objects that delegate behavior

Added to portage

2017-12-11

ldns - 1.7.0-r2
Ebuild name:

net-libs/ldns-1.7.0-r2

Description

a library with the aim to simplify DNS programming in C

Added to portage

2017-12-11

ldns-utils - 1.7.0-r1
Ebuild name:

net-dns/ldns-utils-1.7.0-r1

Description

Set of utilities to simplify various dns(sec) tasks

Added to portage

2017-12-11

libreoffice-bin - 5.4.2.2-r1
Ebuild name:

app-office/libreoffice-bin-5.4.2.2-r1

Description

A full office productivity suite. Binary package

Added to portage

2017-12-11

libreoffice-bin-debug - 5.4.2.2-r1
Ebuild name:

app-office/libreoffice-bin-debug-5.4.2.2-r1

Description

LibreOffice, a full office productivity suite. Binary p

Added to portage

2017-12-11

libvirt - 3.10.0-r1
Ebuild name:

app-emulation/libvirt-3.10.0-r1

Description

C toolkit to manipulate virtual machines

Added to portage

2017-12-11

lutris - 0.4.14
Ebuild name:

games-util/lutris-0.4.14

Description

Lutris is an open source gaming platform for GNU/Linux.

Added to portage

2017-12-11

mailman - 3.1.1
Ebuild name:

net-mail/mailman-3.1.1

Description

Mailman -- the GNU mailing list manager

Added to portage

2017-12-11

mailmanclient - 3.1.1
Ebuild name:

dev-python/mailmanclient-3.1.1

Description

mailmanclient -- python library for Mailman REST API

Added to portage

2017-12-11

mesa - 17.3.0
Ebuild name:

media-libs/mesa-17.3.0

Description

OpenGL-like graphic library for Linux

Added to portage

2017-12-11

meson - 0.44.0
Ebuild name:

dev-util/meson-0.44.0

Description

Open source build system

Added to portage

2017-12-11

nettle - 3.4
Ebuild name:

dev-libs/nettle-3.4

Description

Low-level cryptographic library

Added to portage

2017-12-11

nodejs - 8.9.3
Ebuild name:

net-libs/nodejs-8.9.3

Description

A JavaScript runtime built on Chrome's V8 JavaScript engine

Added to portage

2017-12-11

nodejs - 9.2.1
Ebuild name:

net-libs/nodejs-9.2.1

Description

A JavaScript runtime built on Chrome's V8 JavaScript engine

Added to portage

2017-12-11

opera-developer - 51.0.2802.0
Ebuild name:

www-client/opera-developer-51.0.2802.0

Description

A fast and secure web browser

Added to portage

2017-12-11

pdns-recursor - 4.0.8
Ebuild name:

net-dns/pdns-recursor-4.0.8

Description

The PowerDNS Recursor

Added to portage

2017-12-11

plist - 3.4.0
Ebuild name:

dev-ruby/plist-3.4.0

Description

A library to manipulate Property List files, also known as plists

Added to portage

2017-12-11

portage - 2.3.18
Ebuild name:

sys-apps/portage-2.3.18

Description

Portage is the package management and distribution system for Gentoo

Added to portage

2017-12-11

qbs - 1.10.0
Ebuild name:

dev-util/qbs-1.10.0

Description

Modern build tool for software projects

Added to portage

2017-12-11

qlcplus - 4.11.1
Ebuild name:

app-misc/qlcplus-4.11.1

Description

QLC+ - Q Light Controller Plus to control DMX interfaces

Added to portage

2017-12-11

rsync - 3.1.2-r2
Ebuild name:

net-misc/rsync-3.1.2-r2

Description

File transfer program to keep remote files into sync

Added to portage

2017-12-11

sqlitebrowser - 3.10.1
Ebuild name:

dev-db/sqlitebrowser-3.10.1

Description

SQLite Database Browser

Added to portage

2017-12-11

thunar-volman - 0.8.1-r1
Ebuild name:

xfce-extra/thunar-volman-0.8.1-r1

Description

Daemon that enforces volume-related policies

Added to portage

2017-12-11

uglifier - 4.0.2
Ebuild name:

dev-ruby/uglifier-4.0.2

Description

Ruby wrapper for UglifyJS JavaScript compressor

Added to portage

2017-12-11

urbanterror - 4.3.2_p20171208
Ebuild name:

games-fps/urbanterror-4.3.2_p20171208

Description

Hollywood tactical shooter based on the ioquake3 engine

Added to portage

2017-12-11

vivaldi-snapshot - 1.14.1038.3_p1
Ebuild name:

www-client/vivaldi-snapshot-1.14.1038.3_p1

Description

A new browser for our friends

Added to portage

2017-12-11

wireguard - 0.0.20171211
Ebuild name:

net-vpn/wireguard-0.0.20171211

Description

Simple yet fast and modern VPN that utilizes state-of-the-art crypto

Added to portage

2017-12-11

zope-configuration - 4.1.0
Ebuild name:

dev-python/zope-configuration-4.1.0

Description

Zope Configuration Architecture

Added to portage

2017-12-11

zope-i18nmessageid - 4.1.0
Ebuild name:

dev-python/zope-i18nmessageid-4.1.0

Description

Zope i18nmessageid Architecture

Added to portage

2017-12-11

zope-schema - 4.5.0
Ebuild name:

dev-python/zope-schema-4.5.0

Description

Zope schema Architecture

Added to portage

2017-12-11

rdf newsfeed | rss newsfeed | Atom newsfeed
- Powered by LeopardCMS - Running on Gentoo -
Copyright 2004-2017 Sascha Nitsch Unternehmensberatung UG(haftungsbeschänkt)
Valid XHTML1.1 : Valid CSS : buttonmaker
- Level Triple-A Conformance to Web Content Accessibility Guidelines 1.0 -
- Copyright and legal notices -
Time to create this page: 14.9 ms
system status display