Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    SYNC_PROGRAMMING    |    Synchronet/Baja/XSDK Programming    |    49,116 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 47,318 of 49,116    |
|    scan-admin@coverity.com to All    |
|    New Defects reported by Coverity Scan fo    |
|    30 Sep 25 14:17:12    |
   
   TZUTC: 0000   
   MSGID: 52719.syncprog@1:103/705 2d41ea59   
   PID: Synchronet 3.21a-Linux master/2287878bd Sep 27 2025 GCC 12.2.0   
   TID: SBBSecho 3.30-Linux master/88b423313 Sep 29 2025 GCC 12.2.0   
   BBSID: VERT   
   CHRS: ASCII 1   
   FORMAT: flowed   
      
   ----==_mimepart_68dbe667f0fba_4d6e62b4f2a4a99a44915   
   Content-Type: text/plain; charset=us-ascii   
   Content-Transfer-Encoding: 7bit   
      
   Hi,   
      
   Please find the latest report on new defect(s) introduced to Synchronet found   
   with Coverity Scan.   
      
   3 new defect(s) introduced to Synchronet found with Coverity Scan.   
      
      
   New defect(s) Reported-by: Coverity Scan   
   Showing 3 of 3 defect(s)   
      
      
   ** CID 631052: Null pointer dereferences (FORWARD_NULL)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3367 in in   
   GetFastParsedSectionCmp()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 631052: Null pointer dereferences (FORWARD_NULL)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3367 in    
   niGetFastParsedSectionCmp()   
   3361 return 0;   
   3362 }   
   3363 if (name == NULL || name->str == NULL)   
   3364 return -1;   
   3365 entShorter = fp->name.len < name->len;   
   3366 cmplen = entShorter ? fp->name.len : name->len;   
   >>> CID 631052: Null pointer dereferences (FORWARD_NULL)   
   >>> Passing null pointer "fp->name.str" to "strncasecmp", which   
   dereferences it.   
   3367 cmp = strnicmp(name->str, fp->name.str, cmplen);   
   3368 if (cmp == 0) {   
   3369 if (fp->name.len == name->len)   
   3370 return 0;   
   3371 if (entShorter)   
   3372 return 1;   
      
   ** CID 631051: Integer handling issues (INTEGER_OVERFLOW)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3159 in in   
   FastParseSections()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 631051: Integer handling issues (INTEGER_OVERFLOW)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3159 in    
   niFastParseSections()   
   3153 struct fp_section *sect;   
   3154 size_t slen;   
   3155 str++;   
   3156 slen = strlen(str);   
   3157 while (slen && (IS_WHITESPACE(str[slen - 1])))   
   3158 slen--;   
   >>> CID 631051: Integer handling issues (INTEGER_OVERFLOW)   
   >>> Expression "slen - 1UL", where "slen" is known to be equal to 0,   
   underflows the type of "slen - 1UL", which is type "unsigned long".   
   3159 if (str[slen - 1] == INI_CLOSE_SECTION_CHAR)   
   3160 slen--;   
   3161 else // Discard line   
   3162 continue;   
   3163 ret->totalSections++;   
   3164 if ((ret->totalSections) >= arraySz) {   
      
   ** CID 631050: Integer handling issues (INTEGER_OVERFLOW)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3331 in in   
   GetFastParsedSectionList()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 631050: Integer handling issues (INTEGER_OVERFLOW)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3331 in    
   niGetFastParsedSectionList()   
   3325 if (sz)   
   3326 *sz = 0;   
   3327 return ret;   
   3328 }   
   3329 if (prefix)   
   3330 prefixLen = strlen(prefix);   
   >>> CID 631050: Integer handling issues (INTEGER_OVERFLOW)   
   >>> Expression "i++", where "i" is known to be equal to 1844   
   744073709551615, overflows the type of "i++", which is type "size_t".   
   3331 for (i = iniGetFastPrefixStart(fp, prefix); i <= fp->lastUncut; i++)   
   {   
   3332 if (fp->sections[i].name.str == NULL)   
   3333 continue;   
   3334 if (fp->sections[i].cut)   
   3335 continue;   
   3336 if (fp->sections[i].name.len < prefixLen)   
      
      
   ________________________________________________________________   
   _______________________________________   
   To view the defects in Coverity Scan visit, https://scan.coverit   
   .com/projects/synchronet?tab=overview   
      
      
   ----==_mimepart_68dbe667f0fba_4d6e62b4f2a4a99a44915   
   Content-Type: text/html; charset=us-ascii   
   Content-Transfer-Encoding: 7bit   
      
      
      
      
       
   
Defect Details          
   ** CID 631052: Null pointer dereferences (FORWARD_NULL)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3367 in in   
   GetFastParsedSectionCmp()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 631052: Null pointer dereferences (FORWARD_NULL)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3367 in    
   niGetFastParsedSectionCmp()   
   3361 return 0;   
   3362 }   
   3363 if (name == NULL || name->str == NULL)   
   3364 return -1;   
   3365 entShorter = fp->name.len < name->len;   
   3366 cmplen = entShorter ? fp->name.len : name->len;   
   >>> CID 631052: Null pointer dereferences (FORWARD_NULL)   
   >>> Passing null pointer "fp->name.str" to   
   "strncasecmp", which dereferences it.   
   3367 cmp = strnicmp(name->str, fp->name.str, cmplen);   
   3368 if (cmp == 0) {   
   3369 if (fp->name.len == name->len)   
   3370 return 0;   
   3371 if (entShorter)   
   3372 return 1;   
      
   ** CID 631051: Integer handling issues (INTEGER_OVERFLOW)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3159 in in   
   FastParseSections()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 631051: Integer handling issues (INTEGER_OVERFLOW)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3159 in    
   niFastParseSections()   
   3153 struct fp_section *sect;   
   3154 size_t slen;   
   3155 str++;   
   3156 slen = strlen(str);   
   3157 while (slen && (IS_WHITESPACE(str[slen - 1])))   
   3158 slen--;   
   >>> CID 631051: Integer handling issues (I   
   TEGER_OVERFLOW)   
   >>> Expression "slen - 1UL", where "slen" is   
   known to be equal to 0, underflows the type of "slen - 1UL", which   
   is type "unsigned long".   
   3159 if (str[slen - 1] == INI_CLOSE_SECTION_CHAR)   
   3160 slen--;   
   3161 else // Discard line   
   3162 continue;   
   3163 ret->totalSections++;   
   3164 if ((ret->totalSections) >= arraySz) {   
      
   ** CID 631050: Integer handling issues (INTEGER_OVERFLOW)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3331 in in   
   GetFastParsedSectionList()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 631050: Integer handling issues (INTEGER_OVERFLOW)   
   /tmp/sbbs-Sep-30-2025/src/xpdev/ini_file.c: 3331 in    
   niGetFastParsedSectionList()   
   3325 if (sz)   
   3326 *sz = 0;   
   3327 return ret;   
   3328 }   
   3329 if (prefix)   
   3330 prefixLen = strlen(prefix);   
   >>> CID 631050: Integer handling issues (I   
   TEGER_OVERFLOW)   
   >>> Expression "i++", where "i" is known to   
   be equal to 18446744073709551615, overflows the type of "i++", which   
   is type "size_t".   
   3331 for (i = iniGetFastPrefixStart(fp, prefix); i <= fp   
   >lastUncut; i++) {   
   3332 if (fp->sections[i].name.str == NULL)   
   3333 continue;   
   3334 if (fp->sections[i].cut)   
   3335 continue;   
   3336 if (fp->sections[i].name.len < prefixLen)   
      
       
      
            View Defects in Coverity Scan                      Best regards,        The Coverity Scan Admin Team         |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca