1*4882a593SmuzhiyunUpstream-Status: Backport 2*4882a593Smuzhiyun 3*4882a593Smuzhiyun* Mon Feb 10 2003 Harald Hoyer <harald@redhat.de> 7.6-29 4*4882a593Smuzhiyun- added security patch tcp_wrappers-7.6-sig.patch 5*4882a593Smuzhiyun 6*4882a593Smuzhiyun--- tcp_wrappers_7.6/hosts_access.c.sig 2003-02-10 16:18:31.000000000 +0100 7*4882a593Smuzhiyun+++ tcp_wrappers_7.6/hosts_access.c 2003-02-10 16:50:38.000000000 +0100 8*4882a593Smuzhiyun@@ -66,6 +66,7 @@ 9*4882a593Smuzhiyun 10*4882a593Smuzhiyun #define YES 1 11*4882a593Smuzhiyun #define NO 0 12*4882a593Smuzhiyun+#define ERR -1 13*4882a593Smuzhiyun 14*4882a593Smuzhiyun /* 15*4882a593Smuzhiyun * These variables are globally visible so that they can be redirected in 16*4882a593Smuzhiyun@@ -129,9 +129,9 @@ 17*4882a593Smuzhiyun return (verdict == AC_PERMIT); 18*4882a593Smuzhiyun if (table_match(hosts_allow_table, request)) 19*4882a593Smuzhiyun return (YES); 20*4882a593Smuzhiyun- if (table_match(hosts_deny_table, request)) 21*4882a593Smuzhiyun- return (NO); 22*4882a593Smuzhiyun- return (YES); 23*4882a593Smuzhiyun+ if (table_match(hosts_deny_table, request) == NO) 24*4882a593Smuzhiyun+ return (YES); 25*4882a593Smuzhiyun+ return (NO); 26*4882a593Smuzhiyun } 27*4882a593Smuzhiyun 28*4882a593Smuzhiyun /* table_match - match table entries with (daemon, client) pair */ 29*4882a593Smuzhiyun@@ -175,6 +175,7 @@ 30*4882a593Smuzhiyun (void) fclose(fp); 31*4882a593Smuzhiyun } else if (errno != ENOENT) { 32*4882a593Smuzhiyun tcpd_warn("cannot open %s: %m", table); 33*4882a593Smuzhiyun+ match = ERR; 34*4882a593Smuzhiyun } 35*4882a593Smuzhiyun if (match) { 36*4882a593Smuzhiyun if (hosts_access_verbose > 1) 37