from small one page howto to huge articles all in one place

search text in:




Other .linuxhowtos.org sites: www.linuxhowtos.org
toolsntoys.linuxhowtos.org



Last additions:
How to make X listen on port 6000

How to make X listen on port 6000

words:

34

views:

82827

userrating:

average rating: 1.2 (52 votes) (1=very good 6=terrible)


May, 25th 2007:
April, 26th 2007:
Apr, 10th. 2007:
Druckversion . pdf icon
You are here: Portage


Details of www-servers/nginx:

available versions:

releasesalphaamd64armhppaia64mipsppcppc64ppc macoss390shsparcx86USE-Flagsdependenciesebuild warnings
nginx-9999 -------------none
show
show
nginx-1.29.4 -~~---~~----~none
show
show
nginx-1.29.3-r3 -++---~~----+none
show
show
nginx-1.28.1 -~~---~~----~none
show
show
nginx-1.28.0-r5 -++---~~----+none
show
show
nginx-1.27.5-r1 -~~---~~----~$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX}/var/log/nginx
  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
nginx-1.26.3-r2 -++---~~----+$IUSE
nginx_modules_http_spdy
show
GCC 4.1+ features built-in atomic operations.
Using libatomic_ops is only needed if using
a different compiler or a GCC prior to 4.1
You are building custom modules via \$NGINX_ADD_MODULES!
This nginx installation is not supported!
Make sure you can reproduce the bug without those modules
_before_ reporting bugs.
To actually disable all http-functionality you also have to disable
all nginx http modules.
EXTRA_ECONF applied. Now you are on your own, good luck!

In nginx 1.9.5 the spdy module was superseded by http2.
Update your configs and package.use accordingly.

While you can build lua 3rd party module against ${P}
the author warns that >=${PN}-1.11.11 is still not an
officially supported target yet. You are on your own.
Expect runtime failures, memory leaks and other problems!

Lua 3rd party module author warns against using ${P} with
NGINX_MODULES_HTTP=\
Replacing multiple ${PN}' versions is unsupported! 

The world-readable bit (if set) has been removed from the
following directories to mitigate a security bug
(CVE-2013-0337, bug #458726):

  ${EPREFIX}/var/log/nginx
  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}

Check if this is correct for your setup before restarting nginx!
This is a one-time change and will not happen on subsequent updates.
Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'

The permissions on the following directory have been reset in
order to mitigate a security bug (CVE-2016-1247, bug #605008):

  ${EPREFIX}/var/log/nginx

Check if this is correct for your setup before restarting nginx!
Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!
This is a one-time change and will not happen on subsequent updates.

*************************************************************
***************         W A R N I N G         ***************
*************************************************************
The one-time only attempt to adjust permissions of the
existing nginx installation failed. Be aware that we will not
try to adjust the same permissions again because now you are
using a nginx version where we expect that the permissions
are already adjusted or that you know what you are doing and
want to keep custom permissions.


*************************************************************
***************         W A R N I N G         ***************
*************************************************************
Looks like your installation is vulnerable to CVE-2016-1247
(bug #605008) because nginx user is able to create files in

  ${EPREFIX}/var/log/nginx

Also ensure that no other log directory used by any of your
vhost(s) is not writeable for nginx user. Any of your log files
used by nginx can be abused to escalate privileges!

This nginx installation comes with a mitigation for the HTTPoxy
vulnerability for FastCGI, SCGI and uWSGI applications by setting
the HTTP_PROXY parameter to an empty string per default when you
are sourcing one of the default

  - 'fastcgi_params' or 'fastcgi.conf'
  - 'scgi_params'
  - 'uwsgi_params'

files in your server block(s).

If this is causing any problems for you make sure that you are sourcing the
default parameters _before_ you set your own values.
If you are relying on user-supplied proxy values you have to remove the
correlating lines from the file(s) mentioned above.

show
Legend:
+ stable
~ testing
- not available
some ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown.


back



Support us on Content Nation

New Packages

- as rdf newsfeed
- as rss newsfeed
- as Atom newsfeed
2026-01-15
2026-01-14
awscli - 1.44.17
Ebuild name:

app-admin/awscli-1.44.17

Description

Universal Command Line Environment for AWS

Added to portage

2026-01-14

b2 - 5.4.2
Ebuild name:

dev-build/b2-5.4.2

Description

A system for large project software construction, simple to use and powerful

Added to portage

2026-01-14

boto3 - 1.42.27
Ebuild name:

dev-python/boto3-1.42.27

Description

The AWS SDK for Python

Added to portage

2026-01-14

botocore - 1.42.27
Ebuild name:

dev-python/botocore-1.42.27

Description

Low-level, data-driven core of boto 3

Added to portage

2026-01-14

brltty - 6.8
Ebuild name:

app-accessibility/brltty-6.8

Description

Daemon that provides access to the Linux/Unix console for a blind pers

Added to portage

2026-01-14

cargo-nextest - 0.9.121
Ebuild name:

dev-util/cargo-nextest-0.9.121

Description

Next-generation test runner for Rust

Added to portage

2026-01-14

catch - 3.12.0
Ebuild name:

dev-cpp/catch-3.12.0

Description

Modern C++ header-only framework for unit-tests

Added to portage

2026-01-14

cursor-agent - 2026.01.09
Ebuild name:

dev-util/cursor-agent-2026.01.09

Description

Cursor CLI - interact with AI agents directly from your terminal

Added to portage

2026-01-14

faker - 40.1.2
Ebuild name:

dev-python/faker-40.1.2

Description

A Python package that generates fake data for you

Added to portage

2026-01-14

google-api-python-client - 2.188.0
Ebuild name:

dev-python/google-api-python-client-2.188.0

Description

Google API Client for Python

Added to portage

2026-01-14

gst-python - 1.24.13
Ebuild name:

dev-python/gst-python-1.24.13

Description

A Python Interface to GStreamer

Added to portage

2026-01-14

haml - 7.2.0
Ebuild name:

dev-ruby/haml-7.2.0

Description

A ruby web page templating engine

Added to portage

2026-01-14

httplib2 - 0.31.1
Ebuild name:

dev-python/httplib2-0.31.1

Description

A comprehensive HTTP client library

Added to portage

2026-01-14

hypothesis - 6.150.2
Ebuild name:

dev-python/hypothesis-6.150.2

Description

A library for property based testing

Added to portage

2026-01-14

icu - 78.2
Ebuild name:

dev-libs/icu-78.2

Description

International Components for Unicode

Added to portage

2026-01-14

maxmind-db-reader - 1.13.1
Ebuild name:

dev-php/maxmind-db-reader-1.13.1

Description

PHP reader for the MaxMind database format

Added to portage

2026-01-14

mime-types-data - 3.2026.0113
Ebuild name:

dev-ruby/mime-types-data-3.2026.0113

Description

Registry for information about MIME media type definitions

Added to portage

2026-01-14

osm - 2.0
Ebuild name:

app-emacs/osm-2.0

Description

OpenStreetMap tile-based viewer for GNU Emacs

Added to portage

2026-01-14

pbs-installer - 2026.1.13
Ebuild name:

dev-python/pbs-installer-2026.1.13

Description

Installer for Python Build Standalone

Added to portage

2026-01-14

plasma-wayland-protocols - 1.20.0
Ebuild name:

dev-libs/plasma-wayland-protocols-1.20.0

Description

Plasma Specific Protocols for Wayland

Added to portage

2026-01-14

pyqt5-sip - 12.18.0
Ebuild name:

dev-python/pyqt5-sip-12.18.0

Description

sip extension module for PyQt5

Added to portage

2026-01-14

pyqt6-sip - 13.11.0
Ebuild name:

dev-python/pyqt6-sip-13.11.0

Description

sip module support for PyQt6

Added to portage

2026-01-14

python - 0.3.15.0_alpha4
Ebuild name:

dev-lang/python-0.3.15.0_alpha4

Description

Freethreading (no-GIL) version of Python programming language

Added to portage

2026-01-14

python - 0.3.15.0_alpha5
Ebuild name:

dev-lang/python-0.3.15.0_alpha5

Description

Freethreading (no-GIL) version of Python programming language

Added to portage

2026-01-14

python - 3.15.0_alpha4
Ebuild name:

dev-lang/python-3.15.0_alpha4

Description

An interpreted, interactive, object-oriented programming language

Added to portage

2026-01-14

python - 3.15.0_alpha5
Ebuild name:

dev-lang/python-3.15.0_alpha5

Description

An interpreted, interactive, object-oriented programming language

Added to portage

2026-01-14

qtdeclarative - 6.10.1-r2
Ebuild name:

dev-qt/qtdeclarative-6.10.1-r2

Description

Qt Declarative (Quick 2)

Added to portage

2026-01-14

rdoc - 7.1.0
Ebuild name:

dev-ruby/rdoc-7.1.0

Description

An extended version of the RDoc library from Ruby 1.8

Added to portage

2026-01-14

ruby-atk - 4.3.4
Ebuild name:

dev-ruby/ruby-atk-4.3.4

Description

Ruby Atk bindings

Added to portage

2026-01-14

ruby-gdkpixbuf2 - 4.3.4
Ebuild name:

dev-ruby/ruby-gdkpixbuf2-4.3.4

Description

Ruby GdkPixbuf2 bindings

Added to portage

2026-01-14

ruby-pango - 4.3.4
Ebuild name:

dev-ruby/ruby-pango-4.3.4

Description

Ruby Pango bindings

Added to portage

2026-01-14

sqlglot - 28.6.0
Ebuild name:

dev-python/sqlglot-28.6.0

Description

An easily customizable SQL parser and transpiler

Added to portage

2026-01-14

u-boot-tools - 2024.01-r2
Ebuild name:

dev-embedded/u-boot-tools-2024.01-r2

Description

utilities for working with Das U-Boot

Added to portage

2026-01-14

u-boot-tools - 2025.01-r1
Ebuild name:

dev-embedded/u-boot-tools-2025.01-r1

Description

utilities for working with Das U-Boot

Added to portage

2026-01-14

uv - 0.9.25
Ebuild name:

dev-python/uv-0.9.25

Description

A Python package installer and resolver, written in Rust

Added to portage

2026-01-14

uv-build - 0.9.25
Ebuild name:

dev-python/uv-build-0.9.25

Description

PEP517 uv build backend

Added to portage

2026-01-14

valgrind - 3.26.0_p1
Ebuild name:

dev-debug/valgrind-3.26.0_p1

Description

An open-source memory debugger for GNU/Linux

Added to portage

2026-01-14

wine-staging - 11.0
Ebuild name:

app-emulation/wine-staging-11.0

Description

Free implementation of Windows(tm) on Unix, with Wine-Staging patch

Added to portage

2026-01-14

rdf newsfeed | rss newsfeed | Atom newsfeed
Copyright 2004-2025 Sascha Nitsch Unternehmensberatung GmbH
- Copyright and legal notices -
Time to create this page: 22.3 ms