(/home/sate/Testcases/c/cve/dovecot-1.2.0/src/lib/restrict-access.c) |
| |
| 24 | | | void restrict_access_set_env(const char *user, uid_t uid, |
| 25 | | | gid_t gid, gid_t privileged_gid, |
| 26 | | | const char *chroot_dir, |
| 27 | | | gid_t first_valid_gid, gid_t last_valid_gid, |
| 28 | | | const char *) |
| 29 | | | { |
| 30 | | | if (user != NULL && *user != '\0') |
Event 1:
Skipping " if". user != (void *)0 evaluates to false.
hide
|
|
| 31 | | | env_put(t_strconcat("RESTRICT_USER=", user, NULL)); |
| 32 | | | if (chroot_dir != NULL && *chroot_dir != '\0') |
Event 2:
Skipping " if". chroot_dir != (void *)0 evaluates to false.
hide
|
|
| 33 | | | env_put(t_strconcat("RESTRICT_CHROOT=", chroot_dir, NULL)); |
| 34 | | | |
| 35 | [+][+] | | env_put(t_strdup_printf("RESTRICT_SETUID=%s", dec2str(uid))); |
 |
 |
| |