MimeTeX, licensed under the gpl, lets you easily embed LaTeX math in your html pages. It parses a LaTeX math expression and immediately emits the corresponding gif image, rather than the usual TeX dvi. And mimeTeX is an entirely separate little program that doesn't use TeX or its fonts in any way. It's just one cgi that you put in your site's cgi-bin/ directory, with no other dependencies. So mimeTeX is very easy to install. And it's equally easy to use. Just place an html <img> tag in your document wherever you want to see the corresponding LaTeX expression. For example, <img src="../cgi-bin/mimetex.cgi?f(x)=\int_{-\infty}^xe^{-t^2}dt" alt="" border=0 align=middle> immediately generates the corresponding gif image on-the-fly. MimeTeX doesn't need intermediate dvi-to-gif conversion, and it doesn't create separate gif files for each converted expression. (But if you want image caching, see mimeTeX's -DCACHEPATH=\"path/\" compile option.) Reproducible: Always
Created attachment 115063 [details] dev-tex/mimetex/mimetex-20070331.ebuild
Created attachment 115076 [details] dev-tex/mimetex/mimetex-20070331.ebuild Changed `gcc` to $(tc-getCC) as a developer suggested
in sunrise overlay
There has been a vulnerability report for mimetex: ================================================================================ Name: CVE-2009-1382 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1382 Published: 2009-07-14 Severity: High Description: Multiple stack-based buffer overflows in mimetex.cgi in mimeTeX, when downloaded before 20090713, allow remote attackers to execute arbitrary code via a TeX file with long (1) picture, (2) circle, or (3) input tags. Please consider fixing this issue in sunrise. Note that the Security Team requires this issue to be fixed before the package can enter the official Portage tree. Thanks.
Another vulnerability: ================================================================================ Name: CVE-2009-2459 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2459 Published: 2009-07-14 Severity: High Description: Multiple unspecified vulnerabilities in mimeTeX, when downloaded before 20090713, have unknown impact and attack vectors related to the (1) \environ, (2) \input, and (3) \counter TeX directives.
the person that is mirroring mimetex sources for gentoo (tommy?) should take care of this
The mirrored tarball SRC_URI is no longer valid. Is anyone interested in mirroring the tarball once again or should I mask it for removal?
The package has been removed from the Sunrise overlay.