from small one page howto to huge articles all in one place
 

search text in:




Other .linuxhowtos.org sites: www.linuxhowtos.org
toolsntoys.linuxhowtos.org



Last additions:
How to make X listen on port 6000

How to make X listen on port 6000

words:

34

views:

42720

userrating:

average rating: 1.5 (4 votes) (1=very good 6=terrible)


May, 25th 2007:
April, 26th 2007:
Apr, 10th. 2007:
Druckversion . pdf icon
You are here: Portage


Details of www-servers/nginx:

Description: Robust, small and high performance http and reverse proxy server
Homepage:
https://nginx.org

available versions:

releasesalphaamd64armhppaia64mipsppcppc64ppc macoss390shsparcx86USE-Flagsdependenciesebuild warnings
nginx-1.15.3 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.15.2-r1 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.15.2 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.15.1-r1 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.14.0-r3 -+~---~~----+$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
Legend:
+ stable
~ testing
- not available
some ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown.


back



Other free services
toURL.org
Shorten long
URLs to short
links like
http://tourl.org/2
tourl.org
.
Reverse DNS lookup
Find out which hostname(s)
resolve to a
given IP or other hostnames for the server
www.reversednslookup.org

New Packages

- as rdf newsfeed
- as rss newsfeed
- as Atom newsfeed
2018-09-23
apulse - 0.1.12-r1
Ebuild name:

media-sound/apulse-0.1.12-r1

Description

PulseAudio emulation for ALSA

Added to portage

2018-09-23

cached-property - 1.5.1
Ebuild name:

dev-python/cached-property-1.5.1

Description

A cached-property for decorating methods in classes

Added to portage

2018-09-23

chromium - 70.0.3538.22
Ebuild name:

www-client/chromium-70.0.3538.22

Description

Open-source version of Google Chrome web browser

Added to portage

2018-09-23

evtest - 1.33
Ebuild name:

app-misc/evtest-1.33

Description

test program for capturing input device events

Added to portage

2018-09-23

gcr - 3.28.0
Ebuild name:

app-crypt/gcr-3.28.0

Description

Libraries for cryptographic UIs and accessing PKCS11 modules

Added to portage

2018-09-23

gnome-keyring - 3.28.2
Ebuild name:

gnome-base/gnome-keyring-3.28.2

Description

Password and keyring managing daemon

Added to portage

2018-09-23

liberasurecode - 1.6.0
Ebuild name:

dev-libs/liberasurecode-1.6.0

Description

Erasure Code API library written in C with pluggable Erasure Code bac

Added to portage

2018-09-23

ripgrep - 0.10.0-r1
Ebuild name:

sys-apps/ripgrep-0.10.0-r1

Description

a search tool that combines the usability of ag with the raw speed of gr

Added to portage

2018-09-23

shflags - 1.2.3
Ebuild name:

dev-util/shflags-1.2.3

Description

Command-line flags module for Unix shell scripts

Added to portage

2018-09-23

2018-09-22
ViSP - 3.0.1-r1
Ebuild name:

sci-libs/ViSP-3.0.1-r1

Description

Visual Servoing Platform visual tracking and visual servoing library

Added to portage

2018-09-22

ViSP - 3.1.0-r1
Ebuild name:

sci-libs/ViSP-3.1.0-r1

Description

Visual Servoing Platform visual tracking and visual servoing library

Added to portage

2018-09-22

bunny - 2.12.0
Ebuild name:

dev-ruby/bunny-2.12.0

Description

Another synchronous Ruby AMQP client

Added to portage

2018-09-22

capybara - 3.8.0
Ebuild name:

dev-ruby/capybara-3.8.0

Description

Capybara aims to simplify the process of integration testing Rack applicati

Added to portage

2018-09-22

chrome-binary-plugins - 70.0.3538.22_beta
Ebuild name:

www-plugins/chrome-binary-plugins-70.0.3538.22_beta

Description

Binary plugins from Google Chrome for use in Ch

Added to portage

2018-09-22

chrome-binary-plugins - 71.0.3554.4_alpha
Ebuild name:

www-plugins/chrome-binary-plugins-71.0.3554.4_alpha

Description

Binary plugins from Google Chrome for use in Ch

Added to portage

2018-09-22

cri - 2.15.1
Ebuild name:

dev-ruby/cri-2.15.1

Description

Cri is a library for building easy-to-use commandline tools

Added to portage

2018-09-22

faraday - 0.15.3
Ebuild name:

dev-ruby/faraday-0.15.3

Description

HTTP/REST API client library with pluggable components

Added to portage

2018-09-22

fe - 2.0
Ebuild name:

app-editors/fe-2.0

Description

A small and easy to use folding editor

Added to portage

2018-09-22

gast - 0.2.0
Ebuild name:

dev-python/gast-0.2.0

Description

A generic AST to represent Python2 and Python3's Abstract Syntax Tree (AST)

Added to portage

2018-09-22

glm - 0.9.9.2
Ebuild name:

media-libs/glm-0.9.9.2

Description

OpenGL Mathematics

Added to portage

2018-09-22

google-chrome-beta - 70.0.3538.22
Ebuild name:

www-client/google-chrome-beta-70.0.3538.22

Description

The web browser from Google

Added to portage

2018-09-22

google-chrome-unstable - 71.0.3554.4
Ebuild name:

www-client/google-chrome-unstable-71.0.3554.4

Description

The web browser from Google

Added to portage

2018-09-22

gtest - 1.8.1
Ebuild name:

dev-cpp/gtest-1.8.1

Description

Google C++ Testing Framework

Added to portage

2018-09-22

libfmt - 5.2.1
Ebuild name:

dev-libs/libfmt-5.2.1

Description

Small, safe and fast formatting library

Added to portage

2018-09-22

libreoffice-bin - 6.0.6.2
Ebuild name:

app-office/libreoffice-bin-6.0.6.2

Description

A full office productivity suite. Binary package

Added to portage

2018-09-22

libreoffice-bin-debug - 6.0.6.2
Ebuild name:

app-office/libreoffice-bin-debug-6.0.6.2

Description

LibreOffice, a full office productivity suite. Binary pack

Added to portage

2018-09-22

libuv - 1.23.1
Ebuild name:

dev-libs/libuv-1.23.1

Description

Cross-platform asychronous I/O

Added to portage

2018-09-22

mini_magick - 4.9.2
Ebuild name:

dev-ruby/mini_magick-4.9.2

Description

Manipulate images with minimal use of memory

Added to portage

2018-09-22

mypy - 0.630
Ebuild name:

dev-python/mypy-0.630

Description

Optional static typing for Python

Added to portage

2018-09-22

mysql-init-scripts - 2.2-r4
Ebuild name:

dev-db/mysql-init-scripts-2.2-r4

Description

Gentoo MySQL init scripts.

Added to portage

2018-09-22

nodejs - 10.11.0
Ebuild name:

net-libs/nodejs-10.11.0

Description

A JavaScript runtime built on Chrome's V8 JavaScript engine

Added to portage

2018-09-22

openfire - 4.2.3-r1
Ebuild name:

net-im/openfire-4.2.3-r1

Description

Added to portage

2018-09-22

openvswitch - 2.10.0
Ebuild name:

net-misc/openvswitch-2.10.0

Description

Production quality, multilayer virtual switch

Added to portage

2018-09-22

ovs - 2.9.2
Ebuild name:

dev-python/ovs-2.9.2

Description

OVS bindings for python.

Added to portage

2018-09-22

pidgin-skypeweb - 1.5
Ebuild name:

x11-plugins/pidgin-skypeweb-1.5

Description

SkypeWeb Plugin for Pidgin

Added to portage

2018-09-22

portage-mgorny - 2.3.49.1
Ebuild name:

sys-apps/portage-mgorny-2.3.49.1

Description

Fork of Portage focused on cleaning up and useful features

Added to portage

2018-09-22

postgresql - 11_beta4
Ebuild name:

dev-db/postgresql-11_beta4

Description

PostgreSQL RDBMS

Added to portage

2018-09-22

repoman - 2.3.11
Ebuild name:

app-portage/repoman-2.3.11

Description

Repoman is a Quality Assurance tool for Gentoo ebuilds

Added to portage

2018-09-22

tensorflow - 1.11.0_rc2
Ebuild name:

sci-libs/tensorflow-1.11.0_rc2

Description

Computation framework using data flow graphs for scalable machine le

Added to portage

2018-09-22

tor - 0.3.5.2_alpha
Ebuild name:

net-vpn/tor-0.3.5.2_alpha

Description

Anonymizing overlay network for TCP

Added to portage

2018-09-22

vivaldi-snapshot - 2.0.1309.17_p2
Ebuild name:

www-client/vivaldi-snapshot-2.0.1309.17_p2

Description

A browser for our friends

Added to portage

2018-09-22

xfe - 1.43.1
Ebuild name:

x11-misc/xfe-1.43.1

Description

MS-Explorer-like minimalist file manager for X

Added to portage

2018-09-22

rdf newsfeed | rss newsfeed | Atom newsfeed
- Powered by LeopardCMS - Running on Gentoo -
Copyright 2004-2018 Sascha Nitsch Unternehmensberatung UG(haftungsbeschänkt)
Valid XHTML1.1 : Valid CSS : buttonmaker
- Level Triple-A Conformance to Web Content Accessibility Guidelines 1.0 -
- Copyright and legal notices -
Time to create this page: 8.2 ms