home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 48390 
 scan-admin@coverity.com to All 
 New Defects reported by Coverity Scan fo 
 27 Dec 25 13:44:41 
 
TZUTC: 0000
MSGID: 53818.syncprog@1:103/705 2db5eb05
PID: Synchronet 3.21a-Linux master/114c3dfde Dec 19 2025 GCC 12.2.0
TID: SBBSecho 3.34-Linux master/ffcb56c0e Dec 25 2025 GCC 12.2.0
BBSID: VERT
CHRS: ASCII 1
FORMAT: flowed

----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Hi,

Please find the latest report on new defect(s) introduced to Synchronet found
with Coverity Scan.

1 new defect(s) introduced to Synchronet found with Coverity Scan.


New defect(s) Reported-by: Coverity Scan
Showing 1 of 1 defect(s)


** CID 640112:         (RESOURCE_LEAK)
/js_bbs.cpp: 1875           in js_logline(JSContext *, unsigned int, unsigned
long *)()
/js_bbs.cpp: 1880           in js_logline(JSContext *, unsigned int, unsigned
long *)()


________________________________________________________________
____________________________
*** CID 640112:           (RESOURCE_LEAK)
/js_bbs.cpp: 1875             in js_logline(JSContext *, unsigned int,
unsigned long *)()
1869
1870     	JSSTRING_TO_MSTRING(cx, js_str, code, NULL);
1871     	if (code == NULL)
1872     		return JS_FALSE;
1873
1874     	if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)
>>>     CID 640112:           (RESOURCE_LEAK)
>>>     Variable "code" going out of scope leaks the storage it points to.
1875     		return JS_FALSE;
1876     	argn++;
1877
1878     	JSSTRING_TO_MSTRING(cx, js_str, str, NULL);
1879     	if (str == NULL)
1880     		return JS_FALSE;
/js_bbs.cpp: 1880             in js_logline(JSContext *, unsigned int,
unsigned long *)()
1874     	if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)
1875     		return JS_FALSE;
1876     	argn++;
1877
1878     	JSSTRING_TO_MSTRING(cx, js_str, str, NULL);
1879     	if (str == NULL)
>>>     CID 640112:           (RESOURCE_LEAK)
>>>     Variable "code" going out of scope leaks the storage it points to.
1880     		return JS_FALSE;
1881
1882     	rc = JS_SUSPENDREQUEST(cx);
1883     	sbbs->logline(level, code, str);
1884     	free(code);
1885     	free(str);


________________________________________________________________
_______________________________________
To view the defects in Coverity Scan visit, https://scan.coverit
.com/projects/synchronet?tab=overview


----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit




  
  New Defects Reported - Synchronet
  


  

Hi,

Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

  • New Defects Found: 1
  • Defects Shown: Showing 1 of 1 defect(s)

Defect Details

** CID 640112:         (RESOURCE_LEAK)
/js_bbs.cpp: 1875           in js_logline(JSContext *, unsigned int, unsigned
long *)()
/js_bbs.cpp: 1880           in js_logline(JSContext *, unsigned int, unsigned
long *)()


________________________________________________________________
____________________________
*** CID 640112:           (RESOURCE_LEAK)
/js_bbs.cpp: 1875             in js_logline(JSContext *, unsigned int,
unsigned long *)()
1869
1870     	JSSTRING_TO_MSTRING(cx, js_str, code, NULL);
1871     	if (code == NULL)
1872     		return JS_FALSE;
1873
1874     	if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)
>>>     CID 640112:           (RESOURCE_LEAK)
>>>     Variable "code" going out of scope leaks the
storage it points to.
1875     		return JS_FALSE;
1876     	argn++;
1877
1878     	JSSTRING_TO_MSTRING(cx, js_str, str, NULL);
1879     	if (str == NULL)
1880     		return JS_FALSE;
/js_bbs.cpp: 1880             in js_logline(JSContext *, unsigned int,
unsigned long *)()
1874     	if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL)
1875     		return JS_FALSE;
1876     	argn++;
1877
1878     	JSSTRING_TO_MSTRING(cx, js_str, str, NULL);
1879     	if (str == NULL)
>>>     CID 640112:           (RESOURCE_LEAK)
>>>     Variable "code" going out of scope leaks the
storage it points to.
1880     		return JS_FALSE;
1881
1882     	rc = JS_SUSPENDREQUEST(cx);
1883     	sbbs->logline(level, code, str);
1884     	free(code);
1885     	free(str);

  

View Defects in Coverity Scan

Best regards,

The Coverity Scan Admin Team

----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2-- --- SBBSecho 3.34-Linux * Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705) SEEN-BY: 10/0 1 102/401 103/705 105/81 106/201 124/5016 128/187 129/14 SEEN-BY: 153/7715 154/110 214/22 218/0 1 215 700 810 226/30 227/114 SEEN-BY: 229/110 134 206 317 400 426 428 470 700 705 266/512 280/464 SEEN-BY: 291/111 301/1 320/219 322/757 342/200 396/45 460/58 633/280 SEEN-BY: 712/848 902/26 5075/35 PATH: 103/705 218/700 229/426

<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca