# define WARN_PRIdPTR "ld"
#endif
+/* A tagging macro (for a code static analyzer) to indicate that the */
+/* string obtained from an untrusted source (e.g., argv[], getenv) is */
+/* safe to use in a vulnerable operation (e.g., open, exec). */
+#define TRUSTED_STRING(s) (s)
+
/* Get environment entry */
#ifdef GC_READ_ENV_FILE
GC_INNER char * GC_envfile_getenv(const char *name);
# if (defined(UNIX_LIKE) && !defined(GC_ANDROID_LOG)) \
|| defined(CYGWIN32) || defined(SYMBIAN)
{
- char * file_name = GETENV("GC_LOG_FILE");
+ char * file_name = TRUSTED_STRING(GETENV("GC_LOG_FILE"));
# ifdef GC_LOG_TO_FILE_ALWAYS
if (NULL == file_name)
file_name = GC_LOG_STD_NAME;
&& strcmp(OS_TYPE, argv[2]) != 0) return(0);
fprintf(stderr, "^^^^Starting command^^^^\n");
fflush(stdout);
- execvp(argv[3], argv+3);
+ execvp(TRUSTED_STRING(argv[3]), argv+3);
perror("Couldn't execute");
Usage:
#ifdef __DJGPP__
DIR * d;
#endif /* __DJGPP__ */
+ char *fname;
+
if (argc < 3) goto Usage;
- f = fopen(argv[1], "rb");
+ fname = TRUSTED_STRING(argv[1]);
+ f = fopen(fname, "rb");
if (f != NULL) {
fclose(f);
return(0);
}
- f = fopen(argv[1], "r");
+ f = fopen(fname, "r");
if (f != NULL) {
fclose(f);
return(0);
}
#ifdef __DJGPP__
- if ((d = opendir(argv[1])) != 0) {
+ if ((d = opendir(fname)) != 0) {
closedir(d);
return(0);
}
#endif
printf("^^^^Starting command^^^^\n");
fflush(stdout);
- execvp(argv[2], argv+2);
+ execvp(TRUSTED_STRING(argv[2]), argv+2);
exit(1);
Usage: