diff options
| author | Michael Orlitzky <mjo@gentoo.org> | 2020-02-04 21:09:41 -0500 |
|---|---|---|
| committer | Michael Orlitzky <mjo@gentoo.org> | 2020-02-05 10:48:59 -0500 |
| commit | 2082ac48958748441a089943e3fa188a92b24e4b (patch) | |
| tree | 6d6dc4fc4e4a10d71458b6e106d8be2c4dedb8c1 /dev-python/libvirt-python/libvirt-python-5.8.0.ebuild | |
| parent | 0b66eeacb145f1648b2ee824bd548c3694fe5d5f (diff) | |
| download | gentoo-2082ac48958748441a089943e3fa188a92b24e4b.tar.gz gentoo-2082ac48958748441a089943e3fa188a92b24e4b.tar.bz2 gentoo-2082ac48958748441a089943e3fa188a92b24e4b.zip | |
app-antivirus/clamav-unofficial-sigs: new version 7.0.1.
I am reluctantly adding this new version so that we don't fall too far
behind. Every release of this package gets crazier, and it attempts to
do... let's say "ill-advised" things... to your filesystem when run as
root. To minimize that risk, I've patched the script to exit with an
error if it's run as EUID 0. Running it as "clamav" should still be
safe, in the sense that it can only break your clamav. We have our own
systemd service that runs as a restricted user, so that upstream
vulnerability is fixed in Gentoo too.
Package-Manager: Portage-2.3.84, Repoman-2.3.20
Signed-off-by: Michael Orlitzky <mjo@gentoo.org>
Diffstat (limited to 'dev-python/libvirt-python/libvirt-python-5.8.0.ebuild')
0 files changed, 0 insertions, 0 deletions
