home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   SYNC_PROGRAMMING      Synchronet/Baja/XSDK Programming      49,116 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 48,390 of 49,116   
   scan-admin@coverity.com to All   
   New Defects reported by Coverity Scan fo   
   27 Dec 25 13:44:41   
   
   TZUTC: 0000   
   MSGID: 53818.syncprog@1:103/705 2db5eb05   
   PID: Synchronet 3.21a-Linux master/114c3dfde Dec 19 2025 GCC 12.2.0   
   TID: SBBSecho 3.34-Linux master/ffcb56c0e Dec 25 2025 GCC 12.2.0   
   BBSID: VERT   
   CHRS: ASCII 1   
   FORMAT: flowed   
      
   ----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2   
   Content-Type: text/plain; charset=us-ascii   
   Content-Transfer-Encoding: 7bit   
      
   Hi,   
      
   Please find the latest report on new defect(s) introduced to Synchronet found   
   with Coverity Scan.   
      
   1 new defect(s) introduced to Synchronet found with Coverity Scan.   
      
      
   New defect(s) Reported-by: Coverity Scan   
   Showing 1 of 1 defect(s)   
      
      
   ** CID 640112:         (RESOURCE_LEAK)   
   /js_bbs.cpp: 1875           in js_logline(JSContext *, unsigned int, unsigned   
   long *)()   
   /js_bbs.cpp: 1880           in js_logline(JSContext *, unsigned int, unsigned   
   long *)()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 640112:           (RESOURCE_LEAK)   
   /js_bbs.cpp: 1875             in js_logline(JSContext *, unsigned int,   
   unsigned long *)()   
   1869   
   1870     	JSSTRING_TO_MSTRING(cx, js_str, code, NULL);   
   1871     	if (code == NULL)   
   1872     		return JS_FALSE;   
   1873   
   1874     	if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)   
   >>>     CID 640112:           (RESOURCE_LEAK)   
   >>>     Variable "code" going out of scope leaks the storage it points to.   
   1875     		return JS_FALSE;   
   1876     	argn++;   
   1877   
   1878     	JSSTRING_TO_MSTRING(cx, js_str, str, NULL);   
   1879     	if (str == NULL)   
   1880     		return JS_FALSE;   
   /js_bbs.cpp: 1880             in js_logline(JSContext *, unsigned int,   
   unsigned long *)()   
   1874     	if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)   
   1875     		return JS_FALSE;   
   1876     	argn++;   
   1877   
   1878     	JSSTRING_TO_MSTRING(cx, js_str, str, NULL);   
   1879     	if (str == NULL)   
   >>>     CID 640112:           (RESOURCE_LEAK)   
   >>>     Variable "code" going out of scope leaks the storage it points to.   
   1880     		return JS_FALSE;   
   1881   
   1882     	rc = JS_SUSPENDREQUEST(cx);   
   1883     	sbbs->logline(level, code, str);   
   1884     	free(code);   
   1885     	free(str);   
      
      
   ________________________________________________________________   
   _______________________________________   
   To view the defects in Coverity Scan visit, https://scan.coverit   
   .com/projects/synchronet?tab=overview   
      
      
   ----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2   
   Content-Type: text/html; charset=us-ascii   
   Content-Transfer-Encoding: 7bit   
      
      
      
      
        
     New Defects Reported - Synchronet   
        
      
      
     

Hi,

              

        Please find the latest report on new defect(s) introduced to       Synchronet        found with Coverity Scan.       

              
           
  • New Defects Found: 1
  •        
  • Defects Shown: Showing 1 of 1 defect(s)
  •        
              

Defect Details

       
   
   ** CID 640112:         (RESOURCE_LEAK)   
   /js_bbs.cpp: 1875           in js_logline(JSContext *, unsigned int, unsigned   
   long *)()   
   /js_bbs.cpp: 1880           in js_logline(JSContext *, unsigned int, unsigned   
   long *)()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 640112:           (RESOURCE_LEAK)   
   /js_bbs.cpp: 1875             in js_logline(JSContext *, unsigned int,   
   unsigned long *)()   
   1869   
   1870     	JSSTRING_TO_MSTRING(cx, js_str, code, NULL);   
   1871     	if (code == NULL)   
   1872     		return JS_FALSE;   
   1873   
   1874     	if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)   
   >>>     CID 640112:           (RESOURCE_LEAK)   
   >>>     Variable "code" going out of scope leaks the   
   storage it points to.   
   1875     		return JS_FALSE;   
   1876     	argn++;   
   1877   
   1878     	JSSTRING_TO_MSTRING(cx, js_str, str, NULL);   
   1879     	if (str == NULL)   
   1880     		return JS_FALSE;   
   /js_bbs.cpp: 1880             in js_logline(JSContext *, unsigned int,   
   unsigned long *)()   
   1874     	if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)   
   1875     		return JS_FALSE;   
   1876     	argn++;   
   1877   
   1878     	JSSTRING_TO_MSTRING(cx, js_str, str, NULL);   
   1879     	if (str == NULL)   
   >>>     CID 640112:           (RESOURCE_LEAK)   
   >>>     Variable "code" going out of scope leaks the   
   storage it points to.   
   1880     		return JS_FALSE;   
   1881   
   1882     	rc = JS_SUSPENDREQUEST(cx);   
   1883     	sbbs->logline(level, code, str);   
   1884     	free(code);   
   1885     	free(str);   
      
     
              

        View Defects in Coverity Scan       

              

Best regards,

       

The Coverity Scan Admin Team

                             ----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2--              --- SBBSecho 3.34-Linux        * Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)       SEEN-BY: 10/0 1 102/401 103/705 105/81 106/201 124/5016 128/187 129/14       SEEN-BY: 153/7715 154/110 214/22 218/0 1 215 700 810 226/30 227/114       SEEN-BY: 229/110 134 206 317 400 426 428 470 700 705 266/512 280/464       SEEN-BY: 291/111 301/1 320/219 322/757 342/200 396/45 460/58 633/280       SEEN-BY: 712/848 902/26 5075/35       PATH: 103/705 218/700 229/426          

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca