-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Labels
bugSomething isn't workingSomething isn't workingcriticalCritical priority issues requiring immediate attentionCritical priority issues requiring immediate attentionmodernizationIssues related to C code modernizationIssues related to C code modernizationsecuritySecurity vulnerabilities and fixesSecurity vulnerabilities and fixes
Description
Priority: CRITICAL
File: Src/checkX.c
Function: user_exists()
Discovered: During unit testing in test_checkx_isolated.c
Description: Function crashes with segmentation fault when passed a NULL pointer argument.
Reproduction Steps:
- Call
user_exists(NULL) - Program crashes with segmentation fault
- Expected: Should return 0 (FALSE) safely
Impact: Any code that passes unvalidated input to user_exists() will crash the program. This is a security and stability issue.
Proposed Fix: Add NULL pointer check at function start:
int user_exists(char *who) {
if (who == NULL) {
return 0; /* FALSE - NULL user does not exist */
}
/* ... existing logic ... */
}Original Bug ID: BUG-001
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't workingcriticalCritical priority issues requiring immediate attentionCritical priority issues requiring immediate attentionmodernizationIssues related to C code modernizationIssues related to C code modernizationsecuritySecurity vulnerabilities and fixesSecurity vulnerabilities and fixes