from small one page howto to huge articles all in one place
 

search text in:




Other .linuxhowtos.org sites: www.linuxhowtos.org
toolsntoys.linuxhowtos.org



Last additions:
How to make X listen on port 6000

How to make X listen on port 6000

words:

34

views:

40722

userrating:

average rating: 1.5 (4 votes) (1=very good 6=terrible)


May, 25th 2007:
April, 26th 2007:
Apr, 10th. 2007:
Druckversion . pdf icon
You are here: Portage


Details of www-servers/nginx:

Description: Robust, small and high performance http and reverse proxy server
Homepage:
https://nginx.org

available versions:

releasesalphaamd64armhppaia64mipsppcppc64ppc macoss390shsparcx86USE-Flagsdependenciesebuild warnings
nginx-1.14.0 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.13.12-r1 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.12.2-r1 -+~---~-----+$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX%/}/var/log/nginx
  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX%/}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX%/}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
Legend:
+ stable
~ testing
- not available
some ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown.


back



Other free services
toURL.org
Shorten long
URLs to short
links like
http://tourl.org/2
tourl.org
.
Reverse DNS lookup
Find out which hostname(s)
resolve to a
given IP or other hostnames for the server
www.reversednslookup.org

New Packages

- as rdf newsfeed
- as rss newsfeed
- as Atom newsfeed
2018-05-22
babl - 0.1.50
Ebuild name:

media-libs/babl-0.1.50

Description

A dynamic, any to any, pixel format conversion library

Added to portage

2018-05-22

ck-sources - 4.14.42
Ebuild name:

sys-kernel/ck-sources-4.14.42

Description

Con Kolivas' high performance patchset and Gentoo's genpatches for Li

Added to portage

2018-05-22

ck-sources - 4.16.10
Ebuild name:

sys-kernel/ck-sources-4.16.10

Description

Con Kolivas' high performance patchset and Gentoo's genpatches for Li

Added to portage

2018-05-22

ck-sources - 4.9.101
Ebuild name:

sys-kernel/ck-sources-4.9.101

Description

Con Kolivas' high performance patchset and Gentoo's genpatches for Li

Added to portage

2018-05-22

gentoo-sources - 4.14.42
Ebuild name:

sys-kernel/gentoo-sources-4.14.42

Description

Full sources including the Gentoo patchset for the . kernel tree

Added to portage

2018-05-22

gentoo-sources - 4.16.10
Ebuild name:

sys-kernel/gentoo-sources-4.16.10

Description

Full sources including the Gentoo patchset for the . kernel tree

Added to portage

2018-05-22

gentoo-sources - 4.9.101
Ebuild name:

sys-kernel/gentoo-sources-4.9.101

Description

Full sources including the Gentoo patchset for the . kernel tree

Added to portage

2018-05-22

git-sources - 4.17_rc6
Ebuild name:

sys-kernel/git-sources-4.17_rc6

Description

The very latest -git version of the Linux kernel

Added to portage

2018-05-22

glibc - 2.27-r3
Ebuild name:

sys-libs/glibc-2.27-r3

Description

GNU libc C library

Added to portage

2018-05-22

kramdown - 1.16.2
Ebuild name:

dev-ruby/kramdown-1.16.2

Description

Yet-another-markdown-parser but fast, pure Ruby, using strict syntax defin

Added to portage

2018-05-22

libinput - 1.10.7
Ebuild name:

dev-libs/libinput-1.10.7

Description

Library to handle input devices in Wayland

Added to portage

2018-05-22

linux-firmware - 20180518
Ebuild name:

sys-kernel/linux-firmware-20180518

Description

Linux firmware files

Added to portage

2018-05-22

lxd - 3.1
Ebuild name:

app-emulation/lxd-3.1

Description

Fast, dense and secure container management

Added to portage

2018-05-22

mesa - 18.0.4
Ebuild name:

media-libs/mesa-18.0.4

Description

OpenGL-like graphic library for Linux

Added to portage

2018-05-22

mesa - 18.1.0
Ebuild name:

media-libs/mesa-18.1.0

Description

OpenGL-like graphic library for Linux

Added to portage

2018-05-22

py3status - 3.10
Ebuild name:

x11-misc/py3status-3.10

Description

py3status is an extensible i3status wrapper written in python

Added to portage

2018-05-22

qt-creator - 4.6.1
Ebuild name:

dev-qt/qt-creator-4.6.1

Description

Lightweight IDE for C++/QML development centering around Qt

Added to portage

2018-05-22

redshift - 1.12
Ebuild name:

x11-misc/redshift-1.12

Description

A screen color temperature adjusting software

Added to portage

2018-05-22

shorewall - 5.2.0.4
Ebuild name:

net-firewall/shorewall-5.2.0.4

Description

Added to portage

2018-05-22

sshkit - 1.16.1
Ebuild name:

dev-ruby/sshkit-1.16.1

Description

SSHKit makes it easy to write structured, testable SSH commands in Ruby

Added to portage

2018-05-22

unscd - 0.53
Ebuild name:

sys-apps/unscd-0.53

Description

simple & stable nscd replacement

Added to portage

2018-05-22

vanilla-sources - 4.14.42
Ebuild name:

sys-kernel/vanilla-sources-4.14.42

Description

Full sources for the Linux kernel

Added to portage

2018-05-22

vanilla-sources - 4.16.10
Ebuild name:

sys-kernel/vanilla-sources-4.16.10

Description

Full sources for the Linux kernel

Added to portage

2018-05-22

vanilla-sources - 4.9.101
Ebuild name:

sys-kernel/vanilla-sources-4.9.101

Description

Full sources for the Linux kernel

Added to portage

2018-05-22

vcrpy - 1.12.0
Ebuild name:

dev-python/vcrpy-1.12.0

Description

Automatically mock your HTTP interactions to simplify and speed up testing

Added to portage

2018-05-22

xfce4-whiskermenu-plugin - 2.2.0
Ebuild name:

xfce-extra/xfce4-whiskermenu-plugin-2.2.0

Description

Alternate application launcher for Xfce

Added to portage

2018-05-22

2018-05-21
cmake - 3.11.2
Ebuild name:

dev-util/cmake-3.11.2

Description

Cross platform Make

Added to portage

2018-05-21

hg-git - 0.8.11
Ebuild name:

dev-vcs/hg-git-0.8.11

Description

push to and pull from a Git repository using Mercurial

Added to portage

2018-05-21

pgmodeler - 0.9.1
Ebuild name:

dev-db/pgmodeler-0.9.1

Description

PostgreSQL Database Modeler

Added to portage

2018-05-21

procps - 3.3.15
Ebuild name:

sys-process/procps-3.3.15

Description

standard informational utilities and process-handling tools

Added to portage

2018-05-21

texlive-core - 2017-r4
Ebuild name:

app-text/texlive-core-2017-r4

Description

A complete TeX distribution

Added to portage

2018-05-21

urlwatch - 2.11
Ebuild name:

www-misc/urlwatch-2.11

Description

A tool for monitoring webpages for updates

Added to portage

2018-05-21

wayland-protocols - 1.14
Ebuild name:

dev-libs/wayland-protocols-1.14

Description

Wayland protocol files

Added to portage

2018-05-21

rdf newsfeed | rss newsfeed | Atom newsfeed
- Powered by LeopardCMS - Running on Gentoo -
Copyright 2004-2018 Sascha Nitsch Unternehmensberatung UG(haftungsbeschänkt)
Valid XHTML1.1 : Valid CSS : buttonmaker
- Level Triple-A Conformance to Web Content Accessibility Guidelines 1.0 -
- Copyright and legal notices -
Time to create this page: 8.2 ms