Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    SYNC_PROGRAMMING    |    Synchronet/Baja/XSDK Programming    |    49,116 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 48,351 of 49,116    |
|    scan-admin@coverity.com to All    |
|    New Defects reported by Coverity Scan fo    |
|    19 Dec 25 13:45:09    |
   
   TZUTC: 0000   
   MSGID: 53777.syncprog@1:103/705 2dab5ef9   
   PID: Synchronet 3.21a-Linux master/48922a15c Dec 17 2025 GCC 12.2.0   
   TID: SBBSecho 3.33-Linux master/48922a15c Dec 17 2025 GCC 12.2.0   
   BBSID: VERT   
   CHRS: ASCII 1   
   FORMAT: flowed   
      
   ----==_mimepart_694556e537c80_cf6232c07a52839ac1056   
   Content-Type: text/plain; charset=us-ascii   
   Content-Transfer-Encoding: 7bit   
      
   Hi,   
      
   Please find the latest report on new defect(s) introduced to Synchronet found   
   with Coverity Scan.   
      
   1 new defect(s) introduced to Synchronet found with Coverity Scan.   
      
      
   New defect(s) Reported-by: Coverity Scan   
   Showing 1 of 1 defect(s)   
      
      
   ** CID 640043: (USE_AFTER_FREE)   
   /js_socket.cpp: 3566 in js_listening_socket_constructor(JSContext *,   
   unsigned int, unsigned long *)()   
   /js_socket.cpp: 3540 in js_listening_socket_constructor(JSContext *,   
   unsigned int, unsigned long *)()   
   /js_socket.cpp: 3593 in js_listening_socket_constructor(JSContext *,   
   unsigned int, unsigned long *)()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 640043: (USE_AFTER_FREE)   
   /js_socket.cpp: 3566 in js_listening_socket_constructor(JSContext   
   *, unsigned int, unsigned long *)()   
   3560 }   
   3561   
   3562 if (!js_DefineSocketOptionsArray(cx, obj, type)) {   
   3563 JS_ReportError(cx, "js_DefineSocketOptionsArray failed");   
   3564 xpms_destroy(set, sock_close_cb, nullptr);   
   3565 free(p);   
   >>> CID 640043: (USE_AFTER_FREE)   
   >>> Calling "free" frees pointer "set" which has already been freed.   
   3566 free(set);   
   3567 return JS_FALSE;   
   3568 }   
   3569   
   3570 #ifdef BUILD_JSDOCS   
   3571 js_DescribeSyncObject(cx, obj, "Class used for incoming TCP/IP   
   socket communications", 317);   
   /js_socket.cpp: 3540 in js_listening_socket_constructor(JSContext   
   *, unsigned int, unsigned long *)()   
   3534 JS_SET_RVAL(cx, arglist, OBJECT_TO_JSVAL(obj));   
   3535   
   3536 if ((p = (js_socket_private_t*)malloc(sizeof(js_socket_private_t)))   
   == NULL) {   
   3537 JS_ReportError(cx, "malloc failed");   
   3538 free(protocol);   
   3539 xpms_destroy(set, sock_close_cb, nullptr);   
   >>> CID 640043: (USE_AFTER_FREE)   
   >>> Calling "free" frees pointer "set" which has already been freed.   
   3540 free(set);   
   3541 return JS_FALSE;   
   3542 }   
   3543 memset(p, 0, sizeof(js_socket_private_t));   
   3544 p->type = type;   
   3545 p->set = set;   
   /js_socket.cpp: 3593 in js_listening_socket_constructor(JSContext   
   *, unsigned int, unsigned long *)()   
   3587   
   3588 return JS_TRUE;   
   3589   
   3590 fail:   
   3591 xpms_destroy(set, sock_close_cb, nullptr);   
   3592 free(protocol);   
   >>> CID 640043: (USE_AFTER_FREE)   
   >>> Calling "free" frees pointer "set" which has already been freed.   
   3593 free(set);   
   3594 return JS_FALSE;   
   3595 }   
   3596   
   3597 static JSBool   
   3598 js_socket_constructor(JSContext *cx, uintN argc, jsval *arglist)   
      
      
   ________________________________________________________________   
   _______________________________________   
   To view the defects in Coverity Scan visit, https://scan.coverit   
   .com/projects/synchronet?tab=overview   
      
      
   ----==_mimepart_694556e537c80_cf6232c07a52839ac1056   
   Content-Type: text/html; charset=us-ascii   
   Content-Transfer-Encoding: 7bit   
      
      
      
      
       
   
Defect Details          
   ** CID 640043: (USE_AFTER_FREE)   
   /js_socket.cpp: 3566 in js_listening_socket_constructor(JSContext *,   
   unsigned int, unsigned long *)()   
   /js_socket.cpp: 3540 in js_listening_socket_constructor(JSContext *,   
   unsigned int, unsigned long *)()   
   /js_socket.cpp: 3593 in js_listening_socket_constructor(JSContext *,   
   unsigned int, unsigned long *)()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 640043: (USE_AFTER_FREE)   
   /js_socket.cpp: 3566 in js_listening_socket_constructor(JSContext   
   *, unsigned int, unsigned long *)()   
   3560 }   
   3561   
   3562 if (!js_DefineSocketOptionsArray(cx, obj, type)) {   
   3563 JS_ReportError(cx, "js_DefineSocketOptionsArray failed");   
   3564 xpms_destroy(set, sock_close_cb, nullptr);   
   3565 free(p);   
   >>> CID 640043: (USE_AFTER_FREE)   
   >>> Calling "free" frees pointer "set" which   
   has already been freed.   
   3566 free(set);   
   3567 return JS_FALSE;   
   3568 }   
   3569   
   3570 #ifdef BUILD_JSDOCS   
   3571 js_DescribeSyncObject(cx, obj, "Class used for incoming TCP/IP   
   socket communications", 317);   
   /js_socket.cpp: 3540 in js_listening_socket_constructor(JSContext   
   *, unsigned int, unsigned long *)()   
   3534 JS_SET_RVAL(cx, arglist, OBJECT_TO_JSVAL(obj));   
   3535   
   3536 if ((p = (js_socket_private_t*)malloc(sizeof(js_socket_private_t)))   
   == NULL) {   
   3537 JS_ReportError(cx, "malloc failed");   
   3538 free(protocol);   
   3539 xpms_destroy(set, sock_close_cb, nullptr);   
   >>> CID 640043: (USE_AFTER_FREE)   
   >>> Calling "free" frees pointer "set" which   
   has already been freed.   
   3540 free(set);   
   3541 return JS_FALSE;   
   3542 }   
   3543 memset(p, 0, sizeof(js_socket_private_t));   
   3544 p->type = type;   
   3545 p->set = set;   
   /js_socket.cpp: 3593 in js_listening_socket_constructor(JSContext   
   *, unsigned int, unsigned long *)()   
   3587   
   3588 return JS_TRUE;   
   3589   
   3590 fail:   
   3591 xpms_destroy(set, sock_close_cb, nullptr);   
   3592 free(protocol);   
   >>> CID 640043: (USE_AFTER_FREE)   
   >>> Calling "free" frees pointer "set" which   
   has already been freed.   
   3593 free(set);   
   3594 return JS_FALSE;   
   3595 }   
   3596   
   3597 static JSBool   
   3598 js_socket_constructor(JSContext *cx, uintN argc, jsval *arglist)   
      
       
      
            View Defects in Coverity Scan                      Best regards,        The Coverity Scan Admin Team         |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca