-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Labels
bugSomething isn't workingSomething isn't workingmodernizationIssues related to C code modernizationIssues related to C code modernizationsecuritySecurity vulnerabilities and fixesSecurity vulnerabilities and fixes
Description
Priority: HIGH
File: Src/checkX.c
Function: Multiple functions (user_exists, check_lock, canseelogin)
Discovered: During systematic security pattern analysis
Description: Multiple functions in checkX.c lack NULL pointer validation, creating a pattern of vulnerability.
Functions Affected:
user_exists(): No NULL check before getpwnam(who)check_lock(): No NULL check before open(filename, ...)canseelogin(): No NULL check before strcmp(loginname, ...)
Impact: Systematic crashes when NULL pointers are passed to these security-critical functions.
Proposed Fix: Implement systematic NULL checks across all checkX.c functions:
/* Pattern for all functions */
if (parameter == NULL) {
return appropriate_error_value;
}Original Bug ID: BUG-006
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't workingmodernizationIssues related to C code modernizationIssues related to C code modernizationsecuritySecurity vulnerabilities and fixesSecurity vulnerabilities and fixes