wok annotate portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch @ rev 23193

Up php (7.3.16) CVE-2020-7064/7065/7066
author Pascal Bellard <pascal.bellard@slitaz.org>
date Fri Mar 20 15:21:15 2020 +0100 (2020-03-20)
parents
children
rev   line source
erjo@174 1 --- portmap_5beta/Makefile Fri Feb 1 11:54:29 2008
erjo@174 2 +++ Makefile Fri Feb 1 11:55:19 2008
erjo@174 3 @@ -15,9 +15,9 @@
erjo@174 4 # no access control tables. The local system, since it runs the portmap
erjo@174 5 # daemon, is always treated as an authorized host.
erjo@174 6
erjo@174 7 -HOSTS_ACCESS= -DHOSTS_ACCESS
erjo@174 8 +#HOSTS_ACCESS= -DHOSTS_ACCESS
erjo@174 9 #WRAP_LIB = $(WRAP_DIR)/libwrap.a
erjo@174 10 -WRAP_LIB = -lwrap
erjo@174 11 +#WRAP_LIB = -lwrap
erjo@174 12
erjo@174 13 # Comment out if your RPC library does not allocate privileged ports for
erjo@174 14 # requests from processes with root privilege, or the new portmap will
erjo@174 15 @@ -25,7 +25,7 @@
erjo@174 16 # ports. You can find out by running "rpcinfo -p"; if all mountd and NIS
erjo@174 17 # daemons use a port >= 1024 you should probably disable the next line.
erjo@174 18
erjo@174 19 -CHECK_PORT = -DCHECK_PORT
erjo@174 20 +#CHECK_PORT = -DCHECK_PORT
erjo@174 21
erjo@174 22 # Warning: troublesome feature ahead!! Enable only when you are really
erjo@174 23 # desperate!!