Subj : New Defects reported by Coverity Scan for Synchronet To : All From : scan-admin@coverity.com Date : Sat Dec 27 2025 01:44 pm ----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Hi, Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan. 1 new defect(s) introduced to Synchronet found with Coverity Scan. New defect(s) Reported-by: Coverity Scan Showing 1 of 1 defect(s) ** CID 640112: (RESOURCE_LEAK) /js_bbs.cpp: 1875 in js_logline(JSContext *, unsigned int, unsigned long *)() /js_bbs.cpp: 1880 in js_logline(JSContext *, unsigned int, unsigned long *)() _____________________________________________________________________________________________ *** CID 640112: (RESOURCE_LEAK) /js_bbs.cpp: 1875 in js_logline(JSContext *, unsigned int, unsigned long *)() 1869 1870 JSSTRING_TO_MSTRING(cx, js_str, code, NULL); 1871 if (code == NULL) 1872 return JS_FALSE; 1873 1874 if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL) >>> CID 640112: (RESOURCE_LEAK) >>> Variable "code" going out of scope leaks the storage it points to. 1875 return JS_FALSE; 1876 argn++; 1877 1878 JSSTRING_TO_MSTRING(cx, js_str, str, NULL); 1879 if (str == NULL) 1880 return JS_FALSE; /js_bbs.cpp: 1880 in js_logline(JSContext *, unsigned int, unsigned long *)() 1874 if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL) 1875 return JS_FALSE; 1876 argn++; 1877 1878 JSSTRING_TO_MSTRING(cx, js_str, str, NULL); 1879 if (str == NULL) >>> CID 640112: (RESOURCE_LEAK) >>> Variable "code" going out of scope leaks the storage it points to. 1880 return JS_FALSE; 1881 1882 rc = JS_SUSPENDREQUEST(cx); 1883 sbbs->logline(level, code, str); 1884 free(code); 1885 free(str); ________________________________________________________________________________________________________ To view the defects in Coverity Scan visit, https://scan.coverity.com/projects/synchronet?tab=overview ----==_mimepart_694fe2c8bcbb0_14b1952c2daae15998453b2 Content-Type: text/html; charset=us-ascii Content-Transfer-Encoding: 7bit
Hi,
Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.
** CID 640112: (RESOURCE_LEAK) /js_bbs.cpp: 1875 in js_logline(JSContext *, unsigned int, unsigned long *)() /js_bbs.cpp: 1880 in js_logline(JSContext *, unsigned int, unsigned long *)() _____________________________________________________________________________________________ *** CID 640112: (RESOURCE_LEAK) /js_bbs.cpp: 1875 in js_logline(JSContext *, unsigned int, unsigned long *)() 1869 1870 JSSTRING_TO_MSTRING(cx, js_str, code, NULL); 1871 if (code == NULL) 1872 return JS_FALSE; 1873 1874 if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL) >>> CID 640112: (RESOURCE_LEAK) >>> Variable "code" going out of scope leaks the storage it points to. 1875 return JS_FALSE; 1876 argn++; 1877 1878 JSSTRING_TO_MSTRING(cx, js_str, str, NULL); 1879 if (str == NULL) 1880 return JS_FALSE; /js_bbs.cpp: 1880 in js_logline(JSContext *, unsigned int, unsigned long *)() 1874 if ((js_str = JS_ValueToString(cx, argv[argn])) == NULL) 1875 return JS_FALSE; 1876 argn++; 1877 1878 JSSTRING_TO_MSTRING(cx, js_str, str, NULL); 1879 if (str == NULL) >>> CID 640112: (RESOURCE_LEAK) >>> Variable "code" going out of scope leaks the storage it points to. 1880 return JS_FALSE; 1881 1882 rc = JS_SUSPENDREQUEST(cx); 1883 sbbs->logline(level, code, str); 1884 free(code); 1885 free(str);
Best regards,
The Coverity Scan Admin Team