Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    SYNC_PROGRAMMING    |    Synchronet/Baja/XSDK Programming    |    49,116 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 48,390 of 49,116    |
|    scan-admin@coverity.com to All    |
|    New Defects reported by Coverity Scan fo    |
|    27 Dec 25 13:44:41    |
      TZUTC: 0000       MSGID: 53818.syncprog@1:103/705 2db5eb05       PID: Synchronet 3.21a-Linux master/114c3dfde Dec 19 2025 GCC 12.2.0       TID: SBBSecho 3.34-Linux master/ffcb56c0e Dec 25 2025 GCC 12.2.0       BBSID: VERT       CHRS: ASCII 1       FORMAT: flowed              ----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2       Content-Type: text/plain; charset=us-ascii       Content-Transfer-Encoding: 7bit              Hi,              Please find the latest report on new defect(s) introduced to Synchronet found       with Coverity Scan.              1 new defect(s) introduced to Synchronet found with Coverity Scan.                     New defect(s) Reported-by: Coverity Scan       Showing 1 of 1 defect(s)                     ** CID 640112: (RESOURCE_LEAK)       /js_bbs.cpp: 1875 in js_logline(JSContext *, unsigned int, unsigned       long *)()       /js_bbs.cpp: 1880 in js_logline(JSContext *, unsigned int, unsigned       long *)()                     ________________________________________________________________       ____________________________       *** CID 640112: (RESOURCE_LEAK)       /js_bbs.cpp: 1875 in js_logline(JSContext *, unsigned int,       unsigned long *)()       1869       1870 JSSTRING_TO_MSTRING(cx, js_str, code, NULL);       1871 if (code == NULL)       1872 return JS_FALSE;       1873       1874 if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)       >>> CID 640112: (RESOURCE_LEAK)       >>> Variable "code" going out of scope leaks the storage it points to.       1875 return JS_FALSE;       1876 argn++;       1877       1878 JSSTRING_TO_MSTRING(cx, js_str, str, NULL);       1879 if (str == NULL)       1880 return JS_FALSE;       /js_bbs.cpp: 1880 in js_logline(JSContext *, unsigned int,       unsigned long *)()       1874 if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)       1875 return JS_FALSE;       1876 argn++;       1877       1878 JSSTRING_TO_MSTRING(cx, js_str, str, NULL);       1879 if (str == NULL)       >>> CID 640112: (RESOURCE_LEAK)       >>> Variable "code" going out of scope leaks the storage it points to.       1880 return JS_FALSE;       1881       1882 rc = JS_SUSPENDREQUEST(cx);       1883 sbbs->logline(level, code, str);       1884 free(code);       1885 free(str);                     ________________________________________________________________       _______________________________________       To view the defects in Coverity Scan visit, https://scan.coverit       .com/projects/synchronet?tab=overview                     ----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2       Content-Type: text/html; charset=us-ascii       Content-Transfer-Encoding: 7bit                                           
Defect Details              ** CID 640112: (RESOURCE_LEAK)       /js_bbs.cpp: 1875 in js_logline(JSContext *, unsigned int, unsigned       long *)()       /js_bbs.cpp: 1880 in js_logline(JSContext *, unsigned int, unsigned       long *)()                     ________________________________________________________________       ____________________________       *** CID 640112: (RESOURCE_LEAK)       /js_bbs.cpp: 1875 in js_logline(JSContext *, unsigned int,       unsigned long *)()       1869       1870 JSSTRING_TO_MSTRING(cx, js_str, code, NULL);       1871 if (code == NULL)       1872 return JS_FALSE;       1873       1874 if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)       >>> CID 640112: (RESOURCE_LEAK)       >>> Variable "code" going out of scope leaks the       storage it points to.       1875 return JS_FALSE;       1876 argn++;       1877       1878 JSSTRING_TO_MSTRING(cx, js_str, str, NULL);       1879 if (str == NULL)       1880 return JS_FALSE;       /js_bbs.cpp: 1880 in js_logline(JSContext *, unsigned int,       unsigned long *)()       1874 if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)       1875 return JS_FALSE;       1876 argn++;       1877       1878 JSSTRING_TO_MSTRING(cx, js_str, str, NULL);       1879 if (str == NULL)       >>> CID 640112: (RESOURCE_LEAK)       >>> Variable "code" going out of scope leaks the       storage it points to.       1880 return JS_FALSE;       1881       1882 rc = JS_SUSPENDREQUEST(cx);       1883 sbbs->logline(level, code, str);       1884 free(code);       1885 free(str);                                     View Defects in Coverity Scan                      Best regards,        The Coverity Scan Admin Team         |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca