wok annotate portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch @ rev 23193
Up php (7.3.16) CVE-2020-7064/7065/7066
author | Pascal Bellard <pascal.bellard@slitaz.org> |
---|---|
date | Fri Mar 20 15:21:15 2020 +0100 (2020-03-20) |
parents | |
children |
rev | line source |
---|---|
erjo@174 | 1 --- portmap_5beta/Makefile Fri Feb 1 11:54:29 2008 |
erjo@174 | 2 +++ Makefile Fri Feb 1 11:55:19 2008 |
erjo@174 | 3 @@ -15,9 +15,9 @@ |
erjo@174 | 4 # no access control tables. The local system, since it runs the portmap |
erjo@174 | 5 # daemon, is always treated as an authorized host. |
erjo@174 | 6 |
erjo@174 | 7 -HOSTS_ACCESS= -DHOSTS_ACCESS |
erjo@174 | 8 +#HOSTS_ACCESS= -DHOSTS_ACCESS |
erjo@174 | 9 #WRAP_LIB = $(WRAP_DIR)/libwrap.a |
erjo@174 | 10 -WRAP_LIB = -lwrap |
erjo@174 | 11 +#WRAP_LIB = -lwrap |
erjo@174 | 12 |
erjo@174 | 13 # Comment out if your RPC library does not allocate privileged ports for |
erjo@174 | 14 # requests from processes with root privilege, or the new portmap will |
erjo@174 | 15 @@ -25,7 +25,7 @@ |
erjo@174 | 16 # ports. You can find out by running "rpcinfo -p"; if all mountd and NIS |
erjo@174 | 17 # daemons use a port >= 1024 you should probably disable the next line. |
erjo@174 | 18 |
erjo@174 | 19 -CHECK_PORT = -DCHECK_PORT |
erjo@174 | 20 +#CHECK_PORT = -DCHECK_PORT |
erjo@174 | 21 |
erjo@174 | 22 # Warning: troublesome feature ahead!! Enable only when you are really |
erjo@174 | 23 # desperate!! |