summaryrefslogtreecommitdiff
path: root/dev-python/libvirt-python/libvirt-python-5.8.0.ebuild
diff options
context:
space:
mode:
authorMichael Orlitzky <mjo@gentoo.org>2020-02-04 21:09:41 -0500
committerMichael Orlitzky <mjo@gentoo.org>2020-02-05 10:48:59 -0500
commit2082ac48958748441a089943e3fa188a92b24e4b (patch)
tree6d6dc4fc4e4a10d71458b6e106d8be2c4dedb8c1 /dev-python/libvirt-python/libvirt-python-5.8.0.ebuild
parent0b66eeacb145f1648b2ee824bd548c3694fe5d5f (diff)
downloadgentoo-2082ac48958748441a089943e3fa188a92b24e4b.tar.gz
gentoo-2082ac48958748441a089943e3fa188a92b24e4b.tar.bz2
gentoo-2082ac48958748441a089943e3fa188a92b24e4b.zip
app-antivirus/clamav-unofficial-sigs: new version 7.0.1.
I am reluctantly adding this new version so that we don't fall too far behind. Every release of this package gets crazier, and it attempts to do... let's say "ill-advised" things... to your filesystem when run as root. To minimize that risk, I've patched the script to exit with an error if it's run as EUID 0. Running it as "clamav" should still be safe, in the sense that it can only break your clamav. We have our own systemd service that runs as a restricted user, so that upstream vulnerability is fixed in Gentoo too. Package-Manager: Portage-2.3.84, Repoman-2.3.20 Signed-off-by: Michael Orlitzky <mjo@gentoo.org>
Diffstat (limited to 'dev-python/libvirt-python/libvirt-python-5.8.0.ebuild')
0 files changed, 0 insertions, 0 deletions