• New Defects reported by Coverity Scan for Synchronet

    From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Apr 24 13:09:49 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    5 new defect(s) introduced to Synchronet found with Coverity Scan.
    17 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 5 of 5 defect(s)


    ** CID 331194: Error handling issues (NEGATIVE_RETURNS)
    /filedat.c: 986 in read_diz()


    ________________________________________________________________________________________________________
    *** CID 331194: Error handling issues (NEGATIVE_RETURNS)
    /filedat.c: 986 in read_diz()
    980
    981 if(len > LEN_EXTDESC)
    982 len = LEN_EXTDESC;
    983
    984 char* buf = calloc((size_t)len + 1, 1);
    985 if(buf != NULL)
    CID 331194: Error handling issues (NEGATIVE_RETURNS)
    "(size_t)len" is passed to a parameter that cannot be negative. [Note: The source code implementation of the function has been overridden by a builtin model.]
    986 fread(buf, (size_t)len, 1, fp);
    987 fclose(fp);
    988
    989 char* eof = strchr(buf, CTRL_Z); // CP/M EOF
    990 if(eof != NULL)
    991 *eof = '\0';

    ** CID 331193: Memory - illegal accesses (STRING_NULL)
    /filedat.c: 989 in read_diz()


    ________________________________________________________________________________________________________
    *** CID 331193: Memory - illegal accesses (STRING_NULL)
    /filedat.c: 989 in read_diz()
    983
    984 char* buf = calloc((size_t)len + 1, 1);
    985 if(buf != NULL)
    986 fread(buf, (size_t)len, 1, fp);
    987 fclose(fp);
    988
    CID 331193: Memory - illegal accesses (STRING_NULL)
    Passing unterminated string "buf" to "strchr", which expects a null-terminated string. [Note: The source code implementation of the function has been overridden by a builtin model.]
    989 char* eof = strchr(buf, CTRL_Z); // CP/M EOF
    990 if(eof != NULL)
    991 *eof = '\0';
    992 return buf;
    993 }
    994

    ** CID 331192: Error handling issues (CHECKED_RETURN)
    /filedat.c: 986 in read_diz()


    ________________________________________________________________________________________________________
    *** CID 331192: Error handling issues (CHECKED_RETURN)
    /filedat.c: 986 in read_diz()
    980
    981 if(len > LEN_EXTDESC)
    982 len = LEN_EXTDESC;
    983
    984 char* buf = calloc((size_t)len + 1, 1);
    985 if(buf != NULL)
    CID 331192: Error handling issues (CHECKED_RETURN)
    "fread(void * restrict, size_t, size_t, FILE * restrict)" returns the number of bytes read, but it is ignored.
    986 fread(buf, (size_t)len, 1, fp);
    987 fclose(fp);
    988
    989 char* eof = strchr(buf, CTRL_Z); // CP/M EOF
    990 if(eof != NULL)
    991 *eof = '\0';

    ** CID 331191: Null pointer dereferences (FORWARD_NULL)
    /filedat.c: 989 in read_diz()


    ________________________________________________________________________________________________________
    *** CID 331191: Null pointer dereferences (FORWARD_NULL)
    /filedat.c: 989 in read_diz()
    983
    984 char* buf = calloc((size_t)len + 1, 1);
    985 if(buf != NULL)
    986 fread(buf, (size_t)len, 1, fp);
    987 fclose(fp);
    988
    CID 331191: Null pointer dereferences (FORWARD_NULL)
    Passing null pointer "buf" to "strchr", which dereferences it. [Note: The source code implementation of the function has been overridden by a builtin model.]
    989 char* eof = strchr(buf, CTRL_Z); // CP/M EOF
    990 if(eof != NULL)
    991 *eof = '\0';
    992 return buf;
    993 }
    994

    ** CID 331190: Error handling issues (CHECKED_RETURN)
    /sauce.c: 40 in sauce_fread_record()


    ________________________________________________________________________________________________________
    *** CID 331190: Error handling issues (CHECKED_RETURN)
    /sauce.c: 40 in sauce_fread_record()
    34 return false;
    35
    36 bool result = fread(record, sizeof(*record), 1, fp) == 1
    37 && memcmp(record->id, SAUCE_ID, SAUCE_LEN_ID) == 0
    38 && memcmp(record->ver, SAUCE_VERSION, SAUCE_LEN_VERSION) == 0; 39
    CID 331190: Error handling issues (CHECKED_RETURN)
    Calling "fseeko(fp, offset, 0)" without checking return value. This library function may fail and return an error code.
    40 fseeko(fp, offset, SEEK_SET);
    41 return result;
    42 }
    43
    44 // Get 'type' and/or 'info' from SAUCE record of open file (fp) of DataType 'Character'
    45 bool sauce_fread_charinfo(FILE* fp, enum sauce_char_filetype* type, struct sauce_charinfo* info)


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Dfm2a_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAOYxrH4kA5Bz1vWDzCfmL8E2UcgRq1GtTsPDuyM67QJGDi03PEhQGtn-2BQQhVdp7zGgqCxo1SWhW2T6DWWZ12ezQT3Na1DehPW5kNwXbwArzaEO-2FlvzPwEAeRlY1-2F69gojdgtg5faxH-2FhuSUowy6VZneOstDk5csvQNbHO-2FFe7BJQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sun May 2 12:52:07 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    3 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 3 of 3 defect(s)


    ** CID 331349: Uninitialized variables (MISSING_RETURN) /tmp/sbbs-May-02-2021/src/conio/bitmap_con.c: 446 in color_value()


    ________________________________________________________________________________________________________
    *** CID 331349: Uninitialized variables (MISSING_RETURN) /tmp/sbbs-May-02-2021/src/conio/bitmap_con.c: 446 in color_value()
    440 {
    441 if (col & 0x80000000)
    442 return col;
    443 if (col < sizeof(palette) / sizeof(palette[0]))
    444 return (0xff << 24) | (palette[col].red << 16) | (palette[col].green << 8) | palette[col].blue;
    445 fprintf(stderr, "Invalid colour value: %08x\n", col);
    CID 331349: Uninitialized variables (MISSING_RETURN)
    Arriving at the end of a function without returning a value.
    446 }
    447
    448 static struct rectlist *get_full_rectangle_locked(struct bitmap_screen *screen)
    449 {
    450 size_t i;
    451 struct rectlist *rect;

    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-02-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-02-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-02-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-02-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DX3iR_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrC0xxJyxpTvK74OYpHBTr0bMvC0-2F55E9KXs2tam53Vd4fd9jUb9v2hpVvDivmVVFp4uIrtnyq5l1Wgm8kbqepynubswC56ZayoRnb9MlX-2FR3ROUHXxhLxY1pKgBRAQDFvXZnBNuFV30P7E152dPZ833OWNzH2elopnW-2BrlOv-2FcoDw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue May 4 12:49:23 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.
    2 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 331353: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-May-04-2021/src/xpdev/ini_file.c: 465 in iniSortSections()


    ________________________________________________________________________________________________________
    *** CID 331353: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-May-04-2021/src/xpdev/ini_file.c: 465 in iniSortSections()
    459
    460 if(section_list != NULL)
    461 strListSortAlphaCase(section_list);
    462 new_list = strListInit();
    463 if(new_list == NULL) {
    464 strListFree(&section_list);
    CID 331353: Resource leaks (RESOURCE_LEAK)
    Variable "root_keys" going out of scope leaks the storage it points to. 465 return FALSE;
    466 }
    467 strListAppendList(&new_list, root_keys);
    468 strListFree(&root_keys);
    469 for(i = 0; section_list != NULL && section_list[i] != NULL; i++) {
    470 keys = iniGetSection(*list, section_list[i]);

    ** CID 331352: Memory - illegal accesses (UNINIT)


    ________________________________________________________________________________________________________
    *** CID 331352: Memory - illegal accesses (UNINIT)
    /sbbs_ini.c: 784 in sbbs_write_ini()
    778 style.bit_separator = " | ";
    779
    780 if((list=iniReadFile(fp))==NULL)
    781 return(FALSE);
    782
    783 if(global==NULL) {
    CID 331352: Memory - illegal accesses (UNINIT)
    Using uninitialized value "global_buf.interfaces" when calling "get_ini_globals".
    784 get_ini_globals(list, &global_buf);
    785 global = &global_buf;
    786 }
    787
    788 lp=&list;
    789


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DEfUX_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrA28P387pFw9dgMRK70ZINT9B2FTFVmBIa9VpDPasp9BGRK3Mxaew-2B-2FY0FckgfhdhtFs7aK2mHpCTVSJ2oVHN-2FOUDW-2BjcCmL8CjODBVap2DhWI4tO8Z8n7TcakajD-2FVcNwFQ1gQUvZC41Hwc-2BhpJjh3SC5lYhtMgbEybex-2FmwcP2Q-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed May 5 12:50:08 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    1 new defect(s) introduced to Synchronet found with Coverity Scan.
    2 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 1 of 1 defect(s)


    ** CID 331355: Uninitialized variables (UNINIT) /tmp/sbbs-May-05-2021/src/conio/x_events.c: 516 in local_draw_rect()


    ________________________________________________________________________________________________________
    *** CID 331355: Uninitialized variables (UNINIT) /tmp/sbbs-May-05-2021/src/conio/x_events.c: 516 in local_draw_rect()
    510 else
    511 pixel |= (b >> (0-b_shift)) & visual.blue_mask;
    512 }
    513 for(yscale=0; yscale<x_cvstat.scaling*x_cvstat.vmultiplier; yscale++) {
    514 for(xscale=0; xscale<x_cvstat.scaling; xscale++) {
    515 #ifdef XPutPixel
    CID 331355: Uninitialized variables (UNINIT)
    Using uninitialized value "pixel" when calling "*xim->f.put_pixel".
    516 XPutPixel(xim,(x+rect->rect.x)*x_cvstat.scaling+xscale,(y+rect->rect.y)*x_cvstat.scaling*x_cvstat.vmultiplier+yscale,pixel);
    517 #else
    518 x11.XPutPixel(xim,(x+rect->rect.x)*x_cvstat.scaling+xscale,(y+rect->rect.y)*x_cvstat.scaling*x_cvstat.vmultiplier+yscale,pixel);
    519 #endif
    520 }
    521 }


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DPW3G_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBxatH0DDxXlYvm3SYo1STkctltCB9vEexBduost9lFkdGSuvR-2BbK5YOr-2BOluFIjVwgQtkes-2FX3YRbhsBtthWiIc2t9Gq-2B7kw3prsE8OAOxkGRoAEkCSYAXS-2FphFxa60GOLnXU0P0hkZmFciDUUTzMXUnCFMwLDWHq0UzIlQ1-2BQxg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue May 11 12:46:07 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-11-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-11-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-11-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-11-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DHMTh_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrA-2FhnLdCGd6dMeCnP1CWsDTZrB7Q2KMGwlI8yZJ9Sevo44Azu3vm1Mj5M96OZAhxSKB6v0STNEJogqpYDGD54ixapzYN4401M7XaMS8GUSdvasazJpPcZIQt1UXHlmVVh54TPYmQEtrIRveHjf-2FlSzYDmLq4fdTO1Du8FO2NEL-2BHQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri May 14 12:48:01 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    3 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 3 of 3 defect(s)


    ** CID 331583: (RESOURCE_LEAK)
    /tmp/sbbs-May-14-2021/src/conio/scale.c: 200 in do_scale() /tmp/sbbs-May-14-2021/src/conio/scale.c: 173 in do_scale()


    ________________________________________________________________________________________________________
    *** CID 331583: (RESOURCE_LEAK)
    /tmp/sbbs-May-14-2021/src/conio/scale.c: 200 in do_scale()
    194 ret1->sz = needsz;
    195 }
    196
    197 if (needsz > ret2->sz) {
    198 nt = realloc(ret2->data, needsz);
    199 if (nt == NULL)
    CID 331583: (RESOURCE_LEAK)
    Variable "ret2" going out of scope leaks the storage it points to.
    200 return NULL;
    201 ret2->data = nt;
    202 ret2->sz = needsz;
    203 }
    204
    205 // Copy rect into first buffer /tmp/sbbs-May-14-2021/src/conio/scale.c: 173 in do_scale()
    167 }
    168
    169 if (*xscale != *yscale) {
    170 if (*yscale == *xscale * 2)
    171 ymult *= 2;
    172 else
    CID 331583: (RESOURCE_LEAK)
    Variable "ret2" going out of scope leaks the storage it points to.
    173 return NULL;
    174 }
    175
    176 // Calculate the scaled height from ratio...
    177 if (ratio < 1)
    178 fheight = lround((double)(rect->rect.height * (*yscale)) / ratio);

    ** CID 331582: Uninitialized variables (UNINIT)


    ________________________________________________________________________________________________________
    *** CID 331582: Uninitialized variables (UNINIT)
    /file.cpp: 297 in sbbs_t::editfilename(smbmsg_t *)()
    291 return true;
    292 /* rename */
    293 if(stricmp(str,f->name) && findfile(&cfg, f->dir, path, NULL)) {
    294 bprintf(text[FileAlreadyThere],path);
    295 return false;
    296 }
    CID 331582: Uninitialized variables (UNINIT)
    Using uninitialized value "*dirpath" as argument to "%s" when calling "safe_snprintf".
    297 SAFEPRINTF2(path,"%s%s",dirpath,f->name);
    298 SAFEPRINTF2(tmp,"%s%s",dirpath,str);
    299 if(fexistcase(path) && rename(path,tmp) != 0) {
    300 bprintf(text[CouldntRenameFile],path,tmp);
    301 return false;
    302 }

    ** CID 331581: (RESOURCE_LEAK)
    /tmp/sbbs-May-14-2021/src/conio/scale.c: 173 in do_scale() /tmp/sbbs-May-14-2021/src/conio/scale.c: 200 in do_scale()


    ________________________________________________________________________________________________________
    *** CID 331581: (RESOURCE_LEAK)
    /tmp/sbbs-May-14-2021/src/conio/scale.c: 173 in do_scale()
    167 }
    168
    169 if (*xscale != *yscale) {
    170 if (*yscale == *xscale * 2)
    171 ymult *= 2;
    172 else
    CID 331581: (RESOURCE_LEAK)
    Variable "ret1" going out of scope leaks the storage it points to.
    173 return NULL;
    174 }
    175
    176 // Calculate the scaled height from ratio...
    177 if (ratio < 1)
    178 fheight = lround((double)(rect->rect.height * (*yscale)) / ratio);
    /tmp/sbbs-May-14-2021/src/conio/scale.c: 200 in do_scale()
    194 ret1->sz = needsz;
    195 }
    196
    197 if (needsz > ret2->sz) {
    198 nt = realloc(ret2->data, needsz);
    199 if (nt == NULL)
    CID 331581: (RESOURCE_LEAK)
    Variable "ret1" going out of scope leaks the storage it points to.
    200 return NULL;
    201 ret2->data = nt;
    202 ret2->sz = needsz;
    203 }
    204
    205 // Copy rect into first buffer


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DSNk9_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDNqOeF93LTzMiN-2BXlkx2DWBkGIJWCanQX2uTnnKsqpYRRhZqJ2PhYsO5qpiOVK0BDvuiIrhUR4EjIR5oQGDt665DYDrF8ysSVAFDj7KiWmGsN1QlkSFgPQKgi7Pl3ZtNdBE2MJqRyaneT2BQLMnPKZbiAJosmewAFCQVicjYEPqQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat May 15 12:52:10 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    3 new defect(s) introduced to Synchronet found with Coverity Scan.
    1 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 3 of 3 defect(s)


    ** CID 331591: Control flow issues (DEADCODE) /tmp/sbbs-May-15-2021/src/conio/bitmap_con.c: 196 in bitmap_loadfont_locked()


    ________________________________________________________________________________________________________
    *** CID 331591: Control flow issues (DEADCODE) /tmp/sbbs-May-15-2021/src/conio/bitmap_con.c: 196 in bitmap_loadfont_locked() 190 }
    191 }
    192 for (i=0; i<sizeof(font)/sizeof(font[0]); i++) {
    193 if (current_font[i] < 0)
    194 continue;
    195 switch(fdw) {
    CID 331591: Control flow issues (DEADCODE)
    Execution cannot reach this statement: "case 8:".
    196 case 8:
    197 switch(vstat.charheight) {
    198 case 8:
    199 if(conio_fontdata[current_font[i]].eight_by_eight==NULL) {
    200 if (i==0)
    201 goto error_return;

    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-15-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-15-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-15-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-15-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D3V_W_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBWT-2B5lyDkUnzDanJEHTaxWrpiZ0rx3QNplW-2FK37v8ugfgG4QymLdWTbjsj1HHAKz52hyeeMLtaaiIH9nlebGioivOe2ibLkvN-2ByeqGoEoCAL4v0jkn-2Blnhgw1T1z7LFAGltikKJOAVY2smg66E00WD-2FilHtSdEAIFvFYybBiyJpJFmTThiC-2BGPotnNpdnxvOI-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon May 17 12:51:25 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DDbhH_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAJgx6EHaO2CFM1vO5wazLanFeA2usxbIezV9KW0MkL047ME38gf029Sd8ZUI3tzw-2F4yg4fXRTpL3oRZnMZpMUEuB2TC0RHKFEbuRqJL6GmivxETq0JVyzMeQVJfvvMm9JjE8YwGVc1Iui6qCxlFJipFM-2BbfznT3A5ksdUYKN2HGA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed May 19 12:51:20 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-19-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-19-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-19-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-19-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Dqujj_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrB49eOUN-2BMI5utC2URfFD-2FDAoKVE98NyuFCHINHOBc4kVEWPBuwGNkMGs9-2BrkVnSL0xw7P9zfU9RIt9y32Ks96CRHEw1GyLTLPj0NQwVZTAeXtNLm-2BmgWXUQ1l0yl-2FADV-2Bu0Y-2FZ-2B0HJAaPMh9QP1LyiG4oFCLKLlnvB4xy-2Bh6KOfQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri May 21 12:50:44 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 331789: Concurrent data access violations (MISSING_LOCK) /tmp/sbbs-May-21-2021/src/conio/bitmap_con.c: 719 in blinker_thread()


    ________________________________________________________________________________________________________
    *** CID 331789: Concurrent data access violations (MISSING_LOCK) /tmp/sbbs-May-21-2021/src/conio/bitmap_con.c: 719 in blinker_thread()
    713 if (force_cursor) {
    714 rect = get_full_rectangle_locked(screen);
    715 }
    716 pthread_mutex_unlock(&screen->screenlock);
    717 if (force_cursor) {
    718 cb_drawrect(rect);
    CID 331789: Concurrent data access violations (MISSING_LOCK)
    Accessing "force_cursor" without holding lock "vstatlock". Elsewhere, "force_cursor" is accessed with "vstatlock" held 4 out of 5 times.
    719 force_cursor = 0;
    720 }
    721 }
    722 cb_flush();
    723 pthread_mutex_unlock(&blinker_lock);
    724 }

    ** CID 331788: Concurrent data access violations (MISSING_LOCK) /tmp/sbbs-May-21-2021/src/conio/bitmap_con.c: 708 in blinker_thread()


    ________________________________________________________________________________________________________
    *** CID 331788: Concurrent data access violations (MISSING_LOCK) /tmp/sbbs-May-21-2021/src/conio/bitmap_con.c: 708 in blinker_thread()
    702 // If the other screen is update_pixels == 2, clear it.
    703 pthread_mutex_lock(&ncscreen->screenlock);
    704 if (ncscreen->update_pixels == 2)
    705 ncscreen->update_pixels = 0;
    706 pthread_mutex_unlock(&ncscreen->screenlock); 707 rect = get_full_rectangle_locked(screen);
    CID 331788: Concurrent data access violations (MISSING_LOCK)
    Accessing "screen->update_pixels" without holding lock "bitmap_screen.screenlock". Elsewhere, "bitmap_screen.update_pixels" is accessed with "bitmap_screen.screenlock" held 18 out of 19 times.
    708 screen->update_pixels = 0;
    709 pthread_mutex_unlock(&screen->screenlock);
    710 cb_drawrect(rect);
    711 }
    712 else {
    713 if (force_cursor) {


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DHGU6_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCcdmIwnvIr3t9h2i16O4nf1MKzLsseWMeHmREwusioGmy4neRfaWGTXD3EhCvT6v3TD9bY436EqhV4iRNKZrYqnvZjOuAMUnzewnEAYuUNDbHzlK4L-2Fr8rJSHpZgw9ysbz1Oxs5QHzfZGz33wH-2BH9Sl45HeaIt2U-2BNSzdT1kVZxg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat May 22 12:50:46 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-22-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-22-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-22-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-22-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D8IwS_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDEMcc-2FZpa76I4CncNNYywyowbjZkCXvbc2TJtX-2BYROXM9jJj69LkKZ6IhxcCySa7zetCD6GqlDi3g5bpAezkIP8MCgL7B0h2GJu-2BW8M6-2B7VNvKOkP6bxg39GpS76sPSbOJlczcU5ocgV7-2Fm9-2BwWUfnp4XkLPFjnJ7gOOKyZ7zGPQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed May 26 12:48:36 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-26-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-26-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-26-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-26-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DFzF0_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCrXktCnRsQA7egAhIn1w9eF9R7q1ANKp1fH6gHSYBgR1vF-2FI2TPAsBpEc1Cw0txil4NCV-2FKibVz2IOKbdO-2FSw1vZovp21vRdi1HppPe06fPrVYoP097P5Qclsrkr1-2BiauI-2F8-2BEBwEliVKPPdiaItJ-2BBw4eCYPNvYoRMfDA61BfDg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sun May 30 12:52:27 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-May-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-May-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Dcfb-_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrA1ZloqWFsZx3tI2qisYKa1lgsdAU8qmDlFk0cItal2TGI1pd-2Fi7y0Cq2Jpn0myGs4tS-2B2yjGhUO8-2F8vxHa4HuLxbMVhw-2BGzRp9wTAulUxurGAjiOUmrRLRPcVTGEFUT38kqVeEh9o9ZFGIFvKKuN0p9cDGgZaHXikqHdF4kFz7CA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Jun 3 12:51:46 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-03-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-03-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-03-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-03-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Dr_hZ_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDr4qdJYb9zHEyG-2B5RFlYdY6NjJSzOttgtUg9H9EHwsE3tO5E-2B-2BKTatdv7oi7cHR-2BLEoSFwpfS-2FuWMfJ6wPszjxmesS0586adKXto90Eb7mFP9tl5I68M4ZxLMEjLxZ174044gsHbMpBzObU5-2BbuKWpjpyMJpV1o-2FerJeE5zv59TA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sun Jun 6 12:49:53 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-06-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-06-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-06-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-06-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DG8up_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCypEnRntEhP8Ub-2B-2FZg-2Bap22uZ5QEpyZ8IoVLATQSrm609HG4G-2B8KtcO49Xnsp3Mjz77KcSB4C2VFUl1-2BSvcV9N-2F6r5EA-2BLF-2BEDu6ZMppL6tMvgl1-2FCDv94MKGgzqAO0dFOg4lr8beFojbGo-2BTl1DP-2FQDfRqRlN3iVD7UqfOUr8La590sUu6grjE-2FhUcFeuAMM-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed Jun 9 12:51:42 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    1 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 1 of 1 defect(s)


    ** CID 332219: Control flow issues (DEADCODE)
    /main.cpp: 3967 in sbbs_t::mv(char *, char *, char)()


    ________________________________________________________________________________________________________
    *** CID 332219: Control flow issues (DEADCODE)
    /main.cpp: 3967 in sbbs_t::mv(char *, char *, char)()
    3961 return(0);
    3962 }
    3963 if(!CopyFile(src, dest, /* fail if exists: */true)) {
    3964 errormsg(WHERE, "CopyFile", src, 0, dest);
    3965 return -1;
    3966 }
    CID 332219: Control flow issues (DEADCODE)
    Execution cannot reach the expression "remove(src)" inside this statement: "if (!copy && remove(src)) {...".
    3967 if(!copy && remove(src)) {
    3968 errormsg(WHERE,ERR_REMOVE,src,0);
    3969 return(-1);
    3970 }
    3971 return(0);
    3972 }


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DJdo4_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBBE-2FJI6YRBGypMFdZyXJVPIIKFhPXAf9fo0B5GFPQPQdxfwppj17qbrv2rQ91AdPP2cTE9QcemUMjgHq9UbxjwGOEeJcfWha2Khj7ZkXm1XJ6qsCyNN9GvL6wK0Sq5moa97ehIK5r3sho6efye8-2Bw4BIB4GC8aWGIYT-2BPvwz6ygw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Jun 10 12:47:57 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-10-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-10-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-10-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-10-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Dp7Ym_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAibhOywNIBkSUJ3E8HCmrfkA7O8foKftlYU9srhbsMUnu75-2B4u2JcpgQQ8qUzdLbgMKW0edZWXMEKKdnIlurWc5uBPmk4QrUHA-2BRFGLavt6O2I10mV6mkV9jSR93pB5AQg2sboNYjMhjKszKvZ9jeEzPrR1X-2B3Gmb7ySCPP1sG6g-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri Jun 11 12:54:03 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    1 new defect(s) introduced to Synchronet found with Coverity Scan.
    3 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 1 of 1 defect(s)


    ** CID 332340: Uninitialized variables (UNINIT)
    /main.cpp: 3941 in sbbs_t::mv(const char *, const char *, bool)()


    ________________________________________________________________________________________________________
    *** CID 332340: Uninitialized variables (UNINIT)
    /main.cpp: 3941 in sbbs_t::mv(const char *, const char *, bool)()
    3935 /* returns 0 if successful, -1 if error */
    3936 /****************************************************************************/
    3937 int sbbs_t::mv(const char* path, const char* dest, bool copy)
    3938 {
    3939 char src[MAX_PATH + 1];
    3940
    CID 332340: Uninitialized variables (UNINIT)
    Using uninitialized value "*src" when calling "strcasecmp".
    3941 if(!stricmp(src,dest)) /* source and destination are the same! */
    3942 return(0);
    3943
    3944 SAFECOPY(src, path);
    3945 if(!fexistcase(src)) {
    3946 bprintf("\r\n\7MV ERROR: Source doesn't exist\r\n'%s'\r\n"


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DqQX3_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrC8w0l2JXQ-2BSggRPsHCPc7lfnD4IR8T8jafGE4Y3I2yR1-2Fm4nxDAwhk7UyLUpG8wpaUq2dJHcmPD48DDyoK0D0Hekjp5Jm9oaxCVhGpsxmi6pKNcEXdqGHmOPTVUBpzyX0N2xrH4FsPvPMSEguMRMnI3nHRCv4o1TGFovqRola4Ng-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Jun 17 12:52:09 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DfYkc_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDMCe2TYjdLfMCMMqx7S8vmYGXEZKRfddYrDVGDBlQCC-2BVVNwwNwlLfOnR6I3ixHmYwSAJN6cpxpgiVDfkwF0GTXf8sbZng4OgAOZ-2FM2KNowdnImov0Rdg676DXGN3nP8dw8QReaAsePspSyrPOS8mezSv6uVSu44Dpj29jubKHbg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Jun 22 12:46:59 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-22-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-22-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-22-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-22-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D4WK9_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDxOqLEC4LdQLkB0aSL9Z-2FkY0RPzF2CWJ9NW4Euc1qE08pktocf-2FphNyjghLMuW9UTTweNRvl3L-2F9qiDSd4SQgqUdl3ikEclN5WfcRTFO-2BNFFLn-2FDtue82Ug1QeN3eF8akr8mPycCnsrEwZxqRhluUG8l9lY8zlx0hkIaYzoFdtxg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed Jun 30 12:49:45 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jun-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jun-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D_VVV_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBsg9j7TtTfWJNVEDk3zzLhRx5RU-2FHgWMXipu7WZwFdatJDqEVdXzbjYRnjZLyn9qDGgb8tv5RzvES5xsfsiFDAMCWq1YDY-2BGUI3o7nIgys83btXObDnvAGCAD5oZy3lyd-2BxEWjyNzJ6nvtqRpViDcmDkqvONtSrLdyT-2B1nHl-2FtKQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sun Jul 4 12:47:02 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-04-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-04-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-04-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-04-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D98Nb_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBFmeYUf25jNTEg4rzZa7eKbYMZIfCQDxWU-2BB9IHoQgheZ9giRgk6ukg05Nr5wt2q-2F6VOm-2Fumo-2BAZoMxsVZe0nDWusXrPHu7Y3gkAl4i2orUZVDl-2BfCeXtHaqKISe462CpwzSnQJzss798KMPVLerj-2Fa27HS9TcNs0EmT-2B3cgvqDw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri Jul 9 12:50:46 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-09-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-09-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-09-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-09-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DIFXn_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBpdluWPAkISBghT2ZYApcpaNJYJgmYXh9zpZo-2FdFasCSH2q8WCM3lgVivGhC8Mu4221vTiLwqiCbfOYKdW-2FsI4-2BLIxYCeU3dQj4pWCq-2Fk-2BrU-2FmefAUcHqMBeonAEh8WvYqTF1vaDtnOQJDJZv854-2FrGap1SGfSTyHkoVTc9xIoDQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon Jul 12 12:51:02 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-12-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-12-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-12-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-12-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DpJDl_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCEqP0oTfuSBg1WEKNeGWkrvuT7b-2BgZhMrFAkve8p2uPgKVu-2B9PMLn20E-2F-2FUr-2F2S7yg3S0uRu5qaa9pOGFu0xxwtAYU7j-2FbA-2BAF0sztq9fe1c-2BOvcJniOt1TXmCWe0EkSbNt3imWnlYADbI02JKTcO5kRMaAsPPlAxT3bueK-2F2xHQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Jul 17 12:51:50 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DRrKH_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDerhDp7BA9-2FhYUrslt4UkFF36RddtgsJ0gUsYl3OEBFLP8BPnvPRTOCtsAUiN8Sq5SMmcjvPrngL9mdNz60UBUvgxH8HWLYaUms0YZWquhVbOqZbLkkpTil6XmO4XnXxnKgBVbxOGrf6AqnSfgUTWoQWR7EKY4-2BuExtvEIeQwYyQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Jul 20 12:51:04 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-20-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-20-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-20-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-20-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DStPX_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAL-2FYPfHYZRAWJDugx1NCDz4JGNzkK-2F-2BZ3rKeAL7zpylv4P801AbzQxSodyH9YAZfykjFjpQ222-2B26-2FLvg3y7PpwUzbmHsmfqwBoMDHxMDLIhh9K1St3nHpDe6Inhhf8wm5Pz0vNo94e3b8EDetrcb-2B4uB-2FI-2FrbP6zosysM6VqezQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Jul 24 12:51:26 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-24-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-24-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-24-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-24-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Dr3H8_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDR8KU2N6Vp-2ByLJfa5u33p-2FaC2M-2FsyQGVjHWmy3jPAvHK5dSddupOk5iE9m1aw87mvnPdNTIKBZjj4Z1ycdHTUNrr53aXSEiOMJJ-2F5XkvtJh-2BkIvloqdUcqEakzhlenyYx8uf-2BfAcU08cfAdgVllhT6WLAULalbqasTxm1bwwR0Dg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Jul 27 12:49:16 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jul-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jul-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DkUqo_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDrHLMZhywrUw6puPRyIAEZK8Ulrtv8qUVu1zZ2trnN12Ly3-2Ff2FKGb7-2BxkjKLivQlZjE29cbu9jMNcc50kei4yYGWrtWl-2Ba3LhGovvjA2-2B3tSs2MKpM6XOoB4PTXmyJtgeR6edxU6ORYZRRVTMrzQEZlHlzxyKy6ymcv1-2BG63KKQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon Aug 2 12:48:17 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-02-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-02-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-02-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-02-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DlY6k_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCCjuAQqbaBdUcVsHFpjl86aWsibJ223BnR8-2FAZAWPcsIj55kDJI6RmHHyDRo6zbToHItG9uJLzrg4WE-2BTD4MgTrSY7FoXNjxfTQu3JqX30sYZGNUEBqvEX5JSc8wxYghHkn371PHGO56e0trHyA4FKZXZB75GTNARnZ09uWjcMww-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Aug 5 12:50:20 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-05-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-05-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-05-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-05-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DKY0q_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrD-2Fwuz2x5cIfoZKHpNZGRxOgEd4bvUVxKlUiU0oJJp355N8E49q0YERW14MpSo5IrJjMnUyAjvwX-2F-2By3fl-2FbW-2BfU-2F6hbDckLrpV-2BqArzav0kmmWZKNCN-2BRh5d-2BiYP-2FLtj6M2cZoBpZmNtQfllxPe7fkx-2F8y59jkgGZ6pDF5isfN6Q-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Aug 7 12:49:27 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-07-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-07-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-07-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-07-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DAToa_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBIHHhA8LsVs7HBF3uc1iCK-2B4CJ-2F50KVX-2BYG5yrPWYZB4Gm2vNUFskEGZUDu6HCqKHy2TNkKzcL4KRQofhDDQjcujsiO8s-2Fw8DZISYWQsHDv5coJRFwPBj-2BS8Q2WM7dH9Z-2BsnxDid1P5sd9OUJKIZP5TmhwHNFw6El1kVW03JXm7Q-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Aug 14 12:53:06 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D8s-M_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAv5Rx4Q4XA7C1ITQpemmx2knvOLyKsVp-2BOlz8bC-2F6VG-2Fo9kLVzI07AVnnVImivqUcHFZrSZWll6xbGyMdwMy0V6dFqMc-2Fsco9CTGnVFw6WV0lsywVqvkhbvHFdbbMqKFHww5wLAUIZ9xfreoBk2ic1G5gLO8LifwOIkQoJWa77hQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Aug 17 12:49:42 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-17-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DsoFH_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrC6obAXM1i6Zzdpz2sqTNk7VNTtfJFdYhoRMLcWBOONCDHbaVXOjwtrR9HE0TP6Pk7JBRKEP0-2BPOBWrlfBslr9ZuFM4vtFwtxBRw-2FSVjnwwUUk-2FtECfCDYrfrWuDHIp1IhAWCDElBp4hvYLqVzWmrB4l8tbQh3Sxo-2BVJwuuICp9KA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Aug 26 12:47:33 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-26-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Aug-26-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-26-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Aug-26-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DkmgU_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCb32oBlnO1yJSTCf5oKzzRDxt1sbem2rtGu6l0nB6ZfMw9ez5vNTOMB28OtmneXWMxq4wSp-2BxHuJpKlCS62xu9d9ww8dct5sdYXCGJmztOiJS2TWzskzLANZELxViODJb9Wus6Qfl5gVgkStlB-2F8-2FuYL0dCzr52dAM0hmAtVoI4A-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed Sep 1 12:51:22 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-01-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-01-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-01-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-01-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DqAHm_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAmBrDDpVS-2BnuOleT-2BHdgyo2OmCCyphBElMNczotWgCnTYbSPvHtVanOwI3E8VwV4ERaMRXJ2q6k-2B-2FurdTJvlrA6t1uSDsvdhomOl-2FNKbJbq-2FHSHs6chy5TAI3Wa3NNT7Ya5y-2BhpCQsM1Okjgs69wdekwVDDjbPmXW-2F1NowWog9Kw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed Sep 8 12:51:10 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DEJxs_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDFjskBxhrXkn-2FYDbgWDIdCRIM2UkAJfucEOAgnEoLEJZKmJQgmeMqZx1ZUdrg8HapolZhLhH-2BNjFvj05q1VvFMbPnHovd58Yhxazy1CiVZBW8Rg8UV7zNECr-2BzXT8M57bHNdtoE-2FTRGnsT-2BxhkwcoLQ7mCDWH-2BtjSkqhWpP9XEyA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed Sep 15 12:50:34 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-15-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-15-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-15-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-15-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DJw_E_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBCdTGaC6ML4C-2B7yzBFdwoJSemYZg2pYoZMf3VEC9vEp-2B4NsZQpPfTNsE2OfTt63VAND5jJq9n-2FYFnBNjqNOc72GmRdgPFnk52ac6tTDyZLucqqhbyJAQuFTTApEWlVEaYPY7yrdmBORHtHpQ9-2BKmeWWGxke-2BZiZJbABGDonvHZhA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Sep 18 12:49:46 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-18-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-18-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-18-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-18-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DTkON_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCo-2FTULYEsSI-2BgdAwjojLQZ2IJjBwYpOCQPDGVGqdN2C3Wos2bYIb1zUASbnGVuwN5-2BmF7-2FcTz0bfIJDE1yOZ1FPgAVznHL-2Fw9qHO1702B28TOxvq5s40njRYbDjjyJ62EglpOEh4iXoP6t7ZJ9b-2FqFXV82Rpmsap36wf2MnCbzCw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Sep 21 12:52:54 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-21-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Sep-21-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-21-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Sep-21-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Dq9WM_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrC1-2F9LUAaUQVD91komTzDpS-2FfRlBAt80YHQ54CXb4E0Gry2gotB-2BnCmcG2nBya2Zd4hFVFSXaGcxEapynDKVvnNaAw86frrE2yfuK3ZYiiNy9rFgi3-2Fe-2BBZ-2BgpY1ohPomtvUPe0lKQEYBWp5nbGP821G6D8tOu7Qz2EUDfHbMN3Zg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri Oct 8 12:52:18 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D9L_P_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCoGJldqiJgBXie-2B5MeP4uVSm4jmHAidx0BzBQTjGPPNkPYweOXXAc201MyqPWeMCkDHEr3AHPR9XY5PTW08vXNCmIzhQEIBd8F2fCzWRsgZtVrvL9uXV2i4lQv8bUIuidZGy43aRIZ58U9BavqwOtE6a3OsJz-2FxpBvfGOLUsO1Jg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sun Oct 10 12:55:08 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-10-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-10-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-10-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-10-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DW2-7_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBxhPIixMCaBdRkRNo50H223VMROW1TVN1iLYVTE6ulH9cMsT1HWZIEJ-2BFcbMRFdX4Jsq6ZFHIsQgo-2F7zxMJAzJkXsnkAp5StkU55ddCzwu4YYhjrLiZYbpn7f9RqsqZogEH-2FZ4bVJuZk8k7pchT8mClgHRvjXQUkqRpHQDQ8uDpg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Oct 23 12:54:21 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-23-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-23-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-23-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-23-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DP3SI_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAWcOPACd1uE1U-2F0PoRoFdKmTFjYDAZgusXZu4xRkqKIgv8DoIpi7BoeH1jRcozJmtD4r671l7nVQ-2B-2FrFu8C6w9i-2FTCMBak0nwxW7V1lMNU15-2BekUe1Pa24StPCpv7QLEop19y8RToaw2y3stF6CwBcba0-2Fbp9z8-2Fx-2BXjzlVx2TBg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed Oct 27 13:00:52 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DNXgV_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBiyTKSxCRRaRwDOfLO1qF6gNBuZojHtMawlvXzq0bJTnDsnLcjnD11f3SvEXJRwyMWeuOnmhw63yCZllo2JnyWZYobS4k4-2FELy0AhNLjUOiD6D7fB101q-2F-2BUnfwVuw9GsqUnSZyuruon0PrAPLVmhjGtgvdNn3K2-2BHFOlWWm4iTA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri Oct 29 12:52:56 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-29-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Oct-29-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-29-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Oct-29-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DlHuB_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAOMfD-2F6ikorkEcQkOKRpccoEujsf8Fn-2BSRLOo3jAUq89LO521EbeGAfr1u8BPbJiMK8QTrLqBMFvfSpXnv2lrAbU40LfdIFGd6fb7Hzgqfqbr7rfg9-2BMPxiDa8GkudAP-2B1YAowcWBWMMR-2B4F-2Bu-2FbmjDEtTuhLgbRh2oLUDl39H5g-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri Nov 5 12:59:12 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-05-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-05-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-05-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-05-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DUDE6_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAUAfT9Oo-2FfoWEFl6BSaATDWwF0b-2F-2FPDogZ3BUGvlnzng9SUyVqON6tDnXfSBb1kctk2-2FFroopXaaZMtFjgFCndDhployG9bL-2FSwtT6yLUHiCftfFVzQ1WWaEx3S5MZKaz1NKZjcolUyEc-2FsBu125BOa7X7Fc3I-2FtDAudvcW3Pzmg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon Nov 8 14:07:26 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-08-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DS1mO_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCq1X6sj9hnnzzjsGEogXlIbSEcYZ2oxTV5KmMij2sSSDJCTfGrjkeTlivDC7q7S0tFhKhXTPeOmDpRaotG1rKsxMHdaK-2BjoqltPCoKB1qRJGnonqln6NZ7xU1YL6kSQy-2BMSVIylq7inxuyh6EjX2J1-2B-2FoRCHgOcZDPeT5Wp71RZw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Nov 13 14:13:22 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 342467: API usage errors (PW.PRINTF_ARG_MISMATCH)
    /sbbsecho.c: 1120 in ()


    ________________________________________________________________________________________________________
    *** CID 342467: API usage errors (PW.PRINTF_ARG_MISMATCH)
    /sbbsecho.c: 1120 in ()
    1114 fprintf(fp," TFS");
    1115 else
    1116 fprintf(fp," KFS");
    1117 }
    1118 fprintf(fp,"\r");
    1119 }
    CID 342467: API usage errors (PW.PRINTF_ARG_MISMATCH)
    argument is incompatible with corresponding format string conversion 1120 fprintf(fp, "\1MSGID: %s %08lx\r", smb_faddrtoa(&faddr, NULL), time32(NULL));
    1121 } else {
    1122 if(msg->ftn_msgid != NULL)
    1123 fprintf(fp, "\1MSGID: %.256s\r", msg->ftn_msgid);
    1124 if(msg->ftn_reply != NULL)
    1125 fprintf(fp, "\1REPLY: %.256s\r", msg->ftn_reply);

    ** CID 342466: API usage errors (PRINTF_ARGS)
    /sbbsecho.c: 1120 in create_netmail()


    ________________________________________________________________________________________________________
    *** CID 342466: API usage errors (PRINTF_ARGS)
    /sbbsecho.c: 1120 in create_netmail()
    1114 fprintf(fp," TFS");
    1115 else
    1116 fprintf(fp," KFS");
    1117 }
    1118 fprintf(fp,"\r");
    1119 }
    CID 342466: API usage errors (PRINTF_ARGS)
    Argument "time32(NULL)" to format specifier "%08lx" was expected to have type "unsigned long" but has type "int". [Note: The source code implementation of the function has been overridden by a builtin model.]
    1120 fprintf(fp, "\1MSGID: %s %08lx\r", smb_faddrtoa(&faddr, NULL), time32(NULL));
    1121 } else {
    1122 if(msg->ftn_msgid != NULL)
    1123 fprintf(fp, "\1MSGID: %.256s\r", msg->ftn_msgid);
    1124 if(msg->ftn_reply != NULL)
    1125 fprintf(fp, "\1REPLY: %.256s\r", msg->ftn_reply);


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Db96B_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAHEWm-2BkLZkIQ-2BS5RfZZwg-2FOI8uuYbe-2BVNB-2Fi0jSK-2FSbZzgfWlYUbZ-2FpzyM-2BRUQ4q5Vh5QeZifLoBO7UD6mvBGFKsZ34-2FggaftYUAeDYvs1PHHZpToemgbgisBzQse9A2AEssZOSK4kIaU8gEmhNC0qlBvIlt5bWyIgamWViMCNIw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sun Nov 14 14:01:52 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DmSAg_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDp5A3gEJowTbotqv8NWYBS-2B2i1J4nVG4Yzr4ZsBuuSyDEOxAdscvQTx9NyuGe-2BJ8-2F8rWHKa8qa4EJpGoo3-2FrTLSFcj-2BVpSXFLb6QjXjW-2BlF0STSK4i9-2BAYtcj1Oj1TJBzX-2FhVeZsri6cvDgGHrF257zgHS3P3IXuzDuDfAAMB2-2Bw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sun Nov 21 15:32:51 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-21-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-21-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-21-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-21-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DnZSu_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrA29aneUpi3DjVD-2FGEywFoWPNcnts43GXg4HsQOasAN21eXyUo8TbA7PlgxPnHDX-2BgRb-2FaQOReE0lHGjL64frmCytfK0vHwlplcgZc-2FawsRyPwaLABK55heqh9RYROeKIzP-2B6CJL9hvftCmSMvhSHrvukMFRQQT5poUfmaHt0zcbA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Nov 27 14:00:12 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-27-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DNx3J_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAeFBgqaHqvSJPiA7H4ht8sZvPHOJR5IdqM9XS-2BwyQomKVYE-2Fbb2nt3FtKuSUmerFl4ydXrV-2BPvJ9gwQJfx483lNiEUo-2FrgRGtTvtpiLxTjP7h8xS7okUXlnRUVnNA-2BQS7JjrWBLloE-2BbrO9erbVJgOhbdNwT6xMBo22Jupwk6oMw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon Nov 29 13:59:34 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-29-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Nov-29-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-29-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Nov-29-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D2KB4_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBlYpI2-2BWSMzYC3I9d-2BEnSPQNv0kQoRPXg-2Bs0wTv9PMx28A96h7vJ6P5OEtmG2kWQYoOLmD-2BidlBmPic-2FFmM3Zja321yeKhBcjyzm3a-2Foix9-2FW-2F-2Btn9M1nFyhQlTUm4uzHy6NcCPCkyk3OxBi-2B-2BtaaiQWc1w0zfQLukg5s1512QAw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Dec 4 14:07:36 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-04-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-04-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-04-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-04-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DWGcN_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBVXzETIZ9k9rSh3h41AJQoEZo39OxUypub7O9YQZQHMSm8GzfMN72Gkt3arYUTWzjpTlvP3uHDMJAp9-2Fi5yry38-2BvzKZk-2B7hhlhplO7Kqj3dKpVyQ0AQUh0xB4X5C4ClRZHFzqZyLUTe94i4-2BG0AzpSfaDfRSqgqlLuQyUtLOBPg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Dec 7 13:56:50 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-07-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-07-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-07-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-07-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DsRrh_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCVrQ4bQar8K1mubJWXVk1Zap3d95WE5EKzhtKj41cRVd4K974Xr6U-2FSdvb1C-2F-2BXL51DICHjWTqSGD-2BGvrrJ1bq0V6NPaxuzzEVzd-2FZVMHjyk69KwWTvXqZotUEcM1AJN7pjMEg88WqR8iTpPmf-2BbqXmfUSf565YZucz0M8rJh5KQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Dec 14 13:58:14 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-14-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DxIIH_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBwc65JAUGHGn-2FeHtXgsxQCDJLV8t8oElywko54XKNk9v6VFVMU7FAk-2F6gBCdcuUl3j-2Bff0XyjbyjHViGqbLr3GzUrv7sYyFEiHRmLOv4ynwEPn0x7hOaZN-2B8CCoUG7JpuDoQdqxkmEfq3h48AGgDMB-2F3EVa-2BoHsiMA13HJC7-2BqFg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Dec 18 13:54:09 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-18-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-18-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-18-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-18-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D_e9M_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBayKvKF433Mjpae1vtRTi0PLJwmy25UIatLLOwCMJEqxsmcBCFFnZQKR4Om-2BpLtqePurI2Xwkb5qn1sSZhBbUI-2B9LmxQfGK29NJR8rURuPBqyi5PQ93ZR81D7oFgPUcFDP4mOp6k4XQOpyrxgkwpcZ6loCt5xyzSv1sAbrCFN-2BzA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Dec 23 13:54:40 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-23-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-23-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-23-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-23-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DQyr-_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrD72MJ96-2BGg-2FAZND4XkV53pOgVtCSvuW4wUtUu-2BiVKXDHIF3kKWGCG3D4nmDEJmbCrekYTeDA6s1P-2BjB59jUSOc18f6JNdotS68zvy-2BKIIiRF3ZvZi148SAxd7-2FnW0v2ZSnxSb7Yu4BEDnATcavbTkkHbPOvmH6b1N6G9vs5gnY5A-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Dec 30 13:51:35 2021
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Dec-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Dec-30-2021/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DgHkO_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrA-2BU8E0BPJQFT2piobTwPNekxAXfM-2BA6HFYhDqVS6nRZRE2WMfqG1z9PdcAUxXshZ3UbZtpqdBSBt0yL6in98-2FZaBnpYQwh0PRka9jWdqqgpT3ZbaZBXPJ1ZbjFdP4G2wPJe6466rQValWbV-2Bb-2BYCs8qpVbyfSGc7-2FjIgpP-2B-2BRsLQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon Jan 3 13:53:45 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    1 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 1 of 1 defect(s)


    ** CID 345193: Security best practices violations (STRING_OVERFLOW) /js_system.c: 1742 in js_new_user()


    ________________________________________________________________________________________________________
    *** CID 345193: Security best practices violations (STRING_OVERFLOW) /js_system.c: 1742 in js_new_user()
    1736 user.expire=0;
    1737
    1738 /* settings */
    1739 if(cfg->total_fcomps)
    1740 strcpy(user.tmpext,cfg->fcomp[0]->ext);
    1741 else
    CID 345193: Security best practices violations (STRING_OVERFLOW)
    You might overrun the 4-character fixed-size string "user.tmpext" by copying "supported_archive_formats[0]" without checking the length.
    1742 strcpy(user.tmpext,supported_archive_formats[0]);
    1743
    1744 user.shell=cfg->new_shell;
    1745 user.misc=cfg->new_misc|(AUTOTERM|COLOR);
    1746 user.prot=cfg->new_prot;
    1747 user.qwk=QWK_DEFAULT;


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DLHqT_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrASNRMrjmtERpNIdQUnJSJsKnAEJXIhAxYXn8Wsbe-2FZLcOyNTvGzTXSVf3pSFMNPtPlIb534EHtx-2FbVt-2FfWmb57n4Bq9KDPi7f788OCM9cJpzKEEOL9D4Rv1Q811tuCjU09XGZwjBhiJvxCsLDf07Au06lrQrx64u7WGcNazjKonw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Jan 8 00:24:55 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.
    1 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-07-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-07-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-07-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-07-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D06PA_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBcCjp9DE2Yqx3ZYsNFl6p7s0oM4wg6TKA4jjp7vUVQ7txjLD3qqv-2BblSA7Ar6ZMpL8GzTGJ81A0y56JepW9fpGK-2FDT4rGxTHkLXAlcCCja0JY4hkzxodn5ykHilcjFZDTlxWR2cq2hWjBCsNEdhahenkaiHbJFqQ0wcioW2PeV9mjcHRceXWydx-2By08vZxrxg-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Jan 13 13:54:43 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    1 new defect(s) introduced to Synchronet found with Coverity Scan.
    3 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 1 of 1 defect(s)


    ** CID 345291: (NULL_RETURNS)
    /filedat.c: 202 in loadfiles()
    /filedat.c: 202 in loadfiles()


    ________________________________________________________________________________________________________
    *** CID 345291: (NULL_RETURNS)
    /filedat.c: 202 in loadfiles()
    196 if(len >= 12 && strcspn(filespec, "*?") == len) {
    197 SAFECOPY(newfilespec, filespec);
    198 char* ext = getfext(newfilespec);
    199 if(ext != NULL) {
    200 *ext = 0;
    201 SAFECAT(newfilespec, "*");
    CID 345291: (NULL_RETURNS)
    Dereferencing a pointer that might be "NULL" "(char *)getfext(filespec)" when calling "strcat". [Note: The source code implementation of the function has been overridden by a builtin model.]
    202 SAFECAT(newfilespec, getfext(filespec));
    203 } else
    204 SAFECAT(newfilespec, "*");
    205 filespec = newfilespec;
    206 }
    207 }
    /filedat.c: 202 in loadfiles()
    196 if(len >= 12 && strcspn(filespec, "*?") == len) {
    197 SAFECOPY(newfilespec, filespec);
    198 char* ext = getfext(newfilespec);
    199 if(ext != NULL) {
    200 *ext = 0;
    201 SAFECAT(newfilespec, "*");
    CID 345291: (NULL_RETURNS)
    Dereferencing a pointer that might be "NULL" "(char *)getfext(filespec)" when calling "strlen".
    202 SAFECAT(newfilespec, getfext(filespec));
    203 } else
    204 SAFECAT(newfilespec, "*");
    205 filespec = newfilespec;
    206 }
    207 }


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DGrV8_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDQ-2FZ3IDp0hl0aRs9c3bbZXR09ibAartchzkQRercYp5MpY4M-2FdOLgJu6uM6PF55LOtRkX8GlziQeO71zu92tsVW15fOTPs2xwdwlZEvBvJx7pNfugWTmYp-2FS9RCHU-2BZOe0GsRl57chmm32I25QaJ2KWFRKONC-2BSAufsS-2FWKTiYEw-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Jan 18 13:56:41 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-18-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-18-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-18-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-18-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D7tr1_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDOhxNOip80IculZRgvlagswE8UudKHfml5vWRDhj9wz89s0DuSEhWPPunupD7c66KHrcSSU-2BgdsLC-2BdKAG1Tmtc62sLuY0lFK4gg289CIdtrpmau1qi4oACRWRcXLN3jJcMSozT-2FvR0Gt-2BjBV45g-2BbQ-2FpjBuuKjg9ldKh-2F3IJ0GLBTlqFb2mPnPzvuFJr-2BDtQ-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sun Jan 23 14:03:53 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    3 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 3 of 3 defect(s)


    ** CID 345626: Control flow issues (MISSING_BREAK)
    /putmsg.cpp: 480 in sbbs_t::putmsgfrag(const char *, long &, long, JSObject *)()


    ________________________________________________________________________________________________________
    *** CID 345626: Control flow issues (MISSING_BREAK)
    /putmsg.cpp: 480 in sbbs_t::putmsgfrag(const char *, long &, long, JSObject *)()
    474 }
    475 size_t skip = sizeof(char);
    476 if(mode&P_PETSCII) {
    477 if(term&PETSCII) {
    478 outcom(str[l]);
    479 switch(str[l]) {
    CID 345626: Control flow issues (MISSING_BREAK)
    The case for value "13" is not terminated by a "break" statement.
    480 case '\r': // PETSCII "Return" / new-line
    481 column = 0;
    482 case PETSCII_DOWN:
    483 lncntr++;
    484 break;
    485 case PETSCII_CLEAR:

    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-23-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-23-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-23-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-23-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DK_Jn_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCE1dzADkjZMvFjpzSBiJR1TagLKhkmZJD7Fnc-2FH3viglWAqyL2-2F4M1CHx8BXuG-2FPZt4LtpCqfSLG1jD6xOpXSYwLcHByf-2FDK7-2F2xTr1miMvjlA0hFdd8ycTLDnsRF1aXE8HEZL6FWn6Qh-2BjpJa84TeOUs8Ly4NX1Eehi3KV0330Q-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Jan 27 13:54:29 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-27-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-27-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-27-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-27-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DdE44_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrD-2F1IxqPDEDEHu-2BJYrC5-2Bi1qLbcK5u4jLG2927f55qPZWYr8oIiY8CjXkNGQ3RfItAoC8PHMh628i51Cm0HYm-2FCRrl3BiehVytd-2BAR10GZUF1LttcbEARPpzhKC6-2FIWrYmH5drHxwK6sUVoEpVclPSOEeXVLkI3nDDQhiO4fAV8qg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon Jan 31 13:56:16 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-31-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Jan-31-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-31-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Jan-31-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Dr6tr_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDqb2hb2E035DjqCub8AwEomamhiuucPpvK4o1BEs0Fbqxb4VAkBGwaW3-2BACTcKZKDsNqFh758EE95DdYcYlf6Av75CmmSv5Mz7EOKA4zB1cD-2B6GRxdTfGReiLs8dxIJs0qBHsn485o89Gggc5KZsaHtWsCIEU4TK11aBdEdLJ7kA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Feb 5 13:54:51 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Feb-05-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Feb-05-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Feb-05-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Feb-05-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DtBvR_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDPVZ2EXfQNTuw0BLx0612oXp4woQcAHWvSAVuUH-2FSjPOQ9ksoGLiGZf34z9slVOxR0qnF70laJI4blH5NiRAzQv0Prpepwy-2FPpaN9sftQJUeTJXL07CNlc5JgE41qpbthRafRI3ihVXbXoPb-2BeibSRYXwKcIKOOVtsrU1yk9gqFA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sat Feb 19 13:46:09 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Feb-19-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Feb-19-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Feb-19-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Feb-19-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DsCyd_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrC5cheLda-2FArm40NmrqXkUNtkdkuQZCCna3OHVXYiH4oLi0h87UyEHyCJc-2FXgwG5kd6iItp2VtFjVn8EGv4z1txPpWuyOjap3IvPESckyMhfynEQb0oGfPLQkqoNupP-2FM5aI0sFkfE4Wl5PBepgDMN07ijTinZ4wFeleX9NwtJZrQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Feb 24 13:48:48 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    1 new defect(s) introduced to Synchronet found with Coverity Scan.
    24 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 1 of 1 defect(s)


    ** CID 349724: Error handling issues (NEGATIVE_RETURNS)
    /userdat.c: 1464 in readsmsg()


    ________________________________________________________________________________________________________
    *** CID 349724: Error handling issues (NEGATIVE_RETURNS)
    /userdat.c: 1464 in readsmsg()
    1458 return(NULL);
    1459 length=(long)filelength(file);
    1460 if((buf=(char *)malloc(length+1))==NULL) {
    1461 close(file);
    1462 return(NULL);
    1463 }
    CID 349724: Error handling issues (NEGATIVE_RETURNS)
    "length" is passed to a parameter that cannot be negative. [Note: The source code implementation of the function has been overridden by a builtin model.]
    1464 if(read(file,buf,length)!=length) {
    1465 close(file);
    1466 free(buf);
    1467 return(NULL);
    1468 }
    1469 chsize(file,0L);


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DZ7BT_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDucsQet7CN5MeeBVgzW5eMSbGJc98qxHaPqqpHg3TIaoOBdI0-2Fh66lpiqU3c7CTkLjsmoHkqGMIjv4PN-2BcxufHSQLgsk2bl9kf5PCWevTsdhIK1WzMoJrUv6QopHr8CuiCaFyxCZli-2BhnO6LtGVDH4Z9lxeUXAnTW6djeJddagaQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From MRO@VERT/BBSESINF to scan-admin@coverity.com on Thu Feb 24 09:23:05 2022
    Re: New Defects reported by Coverity Scan for Synchronet
    By: scan-admin@coverity.com to cov-scan@synchro.net on Thu Feb 24 2022 01:48 pm

    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.



    so is this something DM setup or just something someone else decided to do.
    ---
    ■ Synchronet ■ ::: BBSES.info - free BBS services :::
  • From Digital Man@VERT to MRO on Thu Feb 24 13:13:38 2022
    Re: New Defects reported by Coverity Scan for Synchronet
    By: MRO to scan-admin@coverity.com on Thu Feb 24 2022 09:23 am

    so is this something DM setup or just something someone else decided to do.

    Deuce and I set it up, years ago now.
    --
    digital man (rob)

    Rush quote #21:
    You can surrender without a prayer, but never really pray without surrender Norco, CA WX: 57.4°F, 21.0% humidity, 0 mph E wind, 0.00 inches rain/24hrs
    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From Andre@VERT/RDOMENTR to Digital Man on Thu Feb 24 16:15:38 2022
    Re: New Defects reported by Coverity Scan for Synchronet
    By: Digital Man to MRO on Thu Feb 24 2022 01:13 pm

    Deuce and I set it up, years ago now.

    I think I saw 2014?


    - Andre

    ---
    ■ Synchronet ■ Radio Mentor BBS - bbs.radiomentor.org
  • From MRO@VERT/BBSESINF to Digital Man on Thu Feb 24 21:09:16 2022
    Re: New Defects reported by Coverity Scan for Synchronet
    By: Digital Man to MRO on Thu Feb 24 2022 01:13 pm

    Re: New Defects reported by Coverity Scan for Synchronet
    By: MRO to scan-admin@coverity.com on Thu Feb 24 2022 09:23 am

    so is this something DM setup or just something someone else decided to do.

    Deuce and I set it up, years ago now.

    okay but is it actually accurate most of the time, considering that synchronet is a bit obscure compared to what it normally checks?
    ---
    ■ Synchronet ■ ::: BBSES.info - free BBS services :::
  • From Digital Man@VERT to MRO on Thu Feb 24 20:20:48 2022
    Re: New Defects reported by Coverity Scan for Synchronet
    By: MRO to Digital Man on Thu Feb 24 2022 09:09 pm

    Re: New Defects reported by Coverity Scan for Synchronet
    By: Digital Man to MRO on Thu Feb 24 2022 01:13 pm

    Re: New Defects reported by Coverity Scan for Synchronet
    By: MRO to scan-admin@coverity.com on Thu Feb 24 2022 09:23 am

    so is this something DM setup or just something someone else decided to do.

    Deuce and I set it up, years ago now.

    okay but is it actually accurate most of the time, considering that synchronet is a bit obscure compared to what it normally checks?

    Coverity? It's a very accurate static analysis tool. There are false-positives or over-alarmist "issues" reported sometimes, but it's an extremely valueable tool in insuring code quality. There are alternatives too (Microsoft has their own built into Visual Studio), but Coverity has an excellent reputation and is cross-platform. And... free for our use.
    --
    digital man (rob)

    Synchronet/BBS Terminology Definition #34:
    FTN = FidoNet Technology Network
    Norco, CA WX: 47.1°F, 45.0% humidity, 5 mph S wind, 0.00 inches rain/24hrs
    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri Feb 25 13:48:37 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.
    1 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Feb-25-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Feb-25-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Feb-25-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Feb-25-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DIUoh_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAYdMratSAozV6iJMKMpRytvatmpFdJgxorTOdIW128D5-2B4Unefz2l9dVxUSncZSWTt5F1mh3ZNn4JgxRB70Eggjd1zU6QJnc4AIWV3sBZ1-2FFXYzlv0uRQmJtguvPTIvxDOSsU9EjXyct01FxiZMb7M-2Bv4JmFgkZvkJZ0YyBlnHMQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon Feb 28 13:50:47 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    9 new defect(s) introduced to Synchronet found with Coverity Scan.
    5 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 9 of 9 defect(s)


    ** CID 349947: (CHECKED_RETURN) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsapi.cpp: 3959 in JS_ClearScope()
    /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsapi.cpp: 3965 in JS_ClearScope()
    /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsapi.cpp: 3973 in JS_ClearScope()


    ________________________________________________________________________________________________________
    *** CID 349947: (CHECKED_RETURN) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsapi.cpp: 3959 in JS_ClearScope()
    3953 /* Clear cached class objects on the global object. */
    3954 if (obj->isGlobal()) {
    3955 /* This can return false but that doesn't mean it failed. */ 3956 obj->unbrand(cx);
    3957
    3958 for (int key = JSProto_Null; key < JSProto_LIMIT * 3; key++) >>> CID 349947: (CHECKED_RETURN)
    Calling "JS_SetReservedSlot" without checking return value (as is done elsewhere 38 out of 43 times).
    3959 JS_SetReservedSlot(cx, obj, key, JSVAL_VOID);
    3960
    3961 /* Clear regexp statics. */
    3962 RegExpStatics::extractFrom(obj)->clear();
    3963
    3964 /* Clear the CSP eval-is-allowed cache. */ /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsapi.cpp: 3965 in JS_ClearScope()
    3959 JS_SetReservedSlot(cx, obj, key, JSVAL_VOID);
    3960
    3961 /* Clear regexp statics. */
    3962 RegExpStatics::extractFrom(obj)->clear();
    3963
    3964 /* Clear the CSP eval-is-allowed cache. */
    CID 349947: (CHECKED_RETURN)
    Calling "JS_SetReservedSlot" without checking return value (as is done elsewhere 38 out of 43 times).
    3965 JS_SetReservedSlot(cx, obj, JSRESERVED_GLOBAL_EVAL_ALLOWED, JSVAL_VOID);
    3966
    3967 /*
    3968 * Mark global as cleared. If we try to execute any compile-and-go
    3969 * scripts from here on, we will throw.
    3970 */ /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsapi.cpp: 3973 in JS_ClearScope()
    3967 /*
    3968 * Mark global as cleared. If we try to execute any compile-and-go
    3969 * scripts from here on, we will throw.
    3970 */
    3971 int32 flags = obj->getReservedSlot(JSRESERVED_GLOBAL_FLAGS).toInt32();
    3972 flags |= JSGLOBAL_FLAGS_CLEARED;
    CID 349947: (CHECKED_RETURN)
    Calling "JS_SetReservedSlot" without checking return value (as is done elsewhere 38 out of 43 times).
    3973 JS_SetReservedSlot(cx, obj, JSRESERVED_GLOBAL_FLAGS, Jsvalify(Int32Value(flags)));
    3974 }
    3975
    3976 js_InitRandom(cx);
    3977 }
    3978

    ** CID 349946: Error handling issues (CHECKED_RETURN) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/Library.cpp: 259 in js::ctypes::Library::Close(JSContext *, unsigned int, unsigned long *)()


    ________________________________________________________________________________________________________
    *** CID 349946: Error handling issues (CHECKED_RETURN) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/Library.cpp: 259 in js::ctypes::Library::Close(JSContext *, unsigned int, unsigned long *)()
    253 JS_ReportError(cx, "close doesn't take any arguments");
    254 return JS_FALSE;
    255 }
    256
    257 // delete our internal objects
    258 Finalize(cx, obj);
    CID 349946: Error handling issues (CHECKED_RETURN)
    Calling "JS_SetReservedSlot" without checking return value (as is done elsewhere 38 out of 43 times).
    259 JS_SetReservedSlot(cx, obj, SLOT_LIBRARY, PRIVATE_TO_JSVAL(NULL)); 260
    261 JS_SET_RVAL(cx, vp, JSVAL_VOID);
    262 return JS_TRUE;
    263 }
    264

    ** CID 349945: Null pointer dereferences (FORWARD_NULL)


    ________________________________________________________________________________________________________
    *** CID 349945: Null pointer dereferences (FORWARD_NULL) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/CTypes.cpp: 4834 in js::ctypes::FunctionType::Create(JSContext *, unsigned int, unsigned long *)()
    4828 }
    4829
    4830 // Pull out the argument types from the array, if any.
    4831 JS_ASSERT(!argTypes.length() || arrayObj);
    4832 js::AutoArrayRooter items(cx, argTypes.length(), argTypes.begin()); 4833 for (jsuint i = 0; i < argTypes.length(); ++i) {
    CID 349945: Null pointer dereferences (FORWARD_NULL)
    Passing null pointer "arrayObj" to "JS_GetElement", which dereferences it.
    4834 if (!JS_GetElement(cx, arrayObj, i, &argTypes[i]))
    4835 return JS_FALSE;
    4836 }
    4837
    4838 JSObject* result = CreateInternal(cx, argv[0], argv[1],
    4839 argTypes.begin(), argTypes.length());

    ** CID 43174: Security best practices violations (SECURE_TEMP) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/closures.c: 226 in open_temp_exec_file_name()


    ________________________________________________________________________________________________________
    *** CID 43174: Security best practices violations (SECURE_TEMP) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/closures.c: 226 in open_temp_exec_file_name()
    220 static size_t execsize = 0;
    221
    222 /* Open a temporary file name, and immediately unlink it. */
    223 static int
    224 open_temp_exec_file_name (char *name)
    225 {
    CID 43174: Security best practices violations (SECURE_TEMP)
    Calling "mkstemp" without securely setting umask first.
    226 int fd = mkstemp (name);
    227
    228 if (fd != -1)
    229 unlink (name);
    230
    231 return fd;

    ** CID 43169: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/closures.c: 436 in dlmmap_locked()


    ________________________________________________________________________________________________________
    *** CID 43169: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/closures.c: 436 in dlmmap_locked()
    430 }
    431
    432 mmap_exec_offset ((char *)start, length) = (char*)ptr - (char*)start; 433
    434 execsize += length;
    435
    CID 43169: Resource leaks (RESOURCE_LEAK)
    Variable "ptr" going out of scope leaks the storage it points to.
    436 return start;
    437 }
    438
    439 /* Map in a writable and executable chunk of memory if possible.
    440 Failing that, fall back to dlmmap_locked. */
    441 static void *

    ** CID 43149: Control flow issues (MISSING_BREAK) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/x86/ffi64.c: 148 in classify_argument()


    ________________________________________________________________________________________________________
    *** CID 43149: Control flow issues (MISSING_BREAK) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/x86/ffi64.c: 148 in classify_argument()
    142 case FFI_TYPE_UINT16:
    143 case FFI_TYPE_SINT16:
    144 case FFI_TYPE_UINT32:
    145 case FFI_TYPE_SINT32:
    146 case FFI_TYPE_UINT64:
    147 case FFI_TYPE_SINT64:
    CID 43149: Control flow issues (MISSING_BREAK)
    The case for value "14" is not terminated by a "break" statement.
    148 case FFI_TYPE_POINTER:
    149 {
    150 int size = byte_offset + type->size;
    151
    152 if (size <= 4)
    153 {

    ** CID 43148: Program hangs (LOCK) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/dlmalloc.c: 4350 in dlfree()


    ________________________________________________________________________________________________________
    *** CID 43148: Program hangs (LOCK) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/dlmalloc.c: 4350 in dlfree()
    4344 POSTACTION(fm);
    4345 }
    4346 }
    4347 #if !FOOTERS
    4348 #undef fm
    4349 #endif /* FOOTERS */
    CID 43148: Program hangs (LOCK)
    Returning without unlocking "_gm_.mutex".
    4350 }
    4351
    4352 void* dlcalloc(size_t n_elements, size_t elem_size) {
    4353 void* mem;
    4354 size_t req = 0;
    4355 if (n_elements != 0) {

    ** CID 43147: Program hangs (LOCK) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/dlmalloc.c: 4246 in dlmalloc()


    ________________________________________________________________________________________________________
    *** CID 43147: Program hangs (LOCK) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/dlmalloc.c: 4246 in dlmalloc()
    4240 }
    4241
    4242 mem = sys_alloc(gm, nb);
    4243
    4244 postaction:
    4245 POSTACTION(gm);
    CID 43147: Program hangs (LOCK)
    Returning without unlocking "_gm_.mutex".
    4246 return mem;
    4247 }
    4248
    4249 return 0;
    4250 }
    4251

    ** CID 43140: Memory - corruptions (BAD_FREE) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/closures.c: 501 in dlmunmap()


    ________________________________________________________________________________________________________
    *** CID 43140: Memory - corruptions (BAD_FREE) /tmp/sbbs-Feb-28-2022/3rdp/src/mozjs/js-1.8.5/js/src/ctypes/libffi/src/closures.c: 501 in dlmunmap()
    495 #if FFI_CLOSURE_TEST
    496 printf ("unmapping %zi\n", length);
    497 #endif
    498
    499 if (seg && (code = add_segment_exec_offset (start, seg)) != start) 500 {
    CID 43140: Memory - corruptions (BAD_FREE)
    "munmap" frees incorrect pointer "code".
    501 int ret = munmap (code, length);
    502 if (ret)
    503 return ret;
    504 }
    505
    506 return munmap (start, length);


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DBdDU_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrAWQK-2BbauFoR8oEcd8fVvowWww1uOREp83U-2BQv-2F49ZxHjLovWpQVbJzCo15li7JaqiLVFDhjl0JEgQeQKrnzmY9Xam1jd0jpy91zK33qTfOzOatQbuBkc6tp1BrmOUJzbyc0kg3LQP5h22pzEnSi6XFuU-2FNv7elDIbIVbH0Y0tr0w-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Mar 1 13:56:04 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    79 new defect(s) introduced to Synchronet found with Coverity Scan.
    12 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 20 of 79 defect(s)


    ** CID 350349: Memory - illegal accesses (STRING_NULL)
    /telgate.cpp: 194 in sbbs_t::telnet_gate(char *, unsigned long, unsigned int, char *, char *, char *)()


    ________________________________________________________________________________________________________
    *** CID 350349: Memory - illegal accesses (STRING_NULL)
    /telgate.cpp: 194 in sbbs_t::telnet_gate(char *, unsigned long, unsigned int, char *, char *, char *)()
    188 l=K_CHAT;
    189 if(!(mode&TG_ECHO))
    190 l|=K_NOECHO;
    191 rd=getstr((char*)buf,sizeof(buf)-1,l);
    192 if(!rd)
    193 continue;
    CID 350349: Memory - illegal accesses (STRING_NULL)
    Passing unterminated string "buf" to "strlen", which expects a null-terminated string.
    194 SAFECAT(buf,crlf);
    195 rd+=2;
    196 gotline=true;
    197 }
    198 if((mode&TG_CRLF) && buf[rd-1]=='\r') 199 buf[rd++]='\n';

    ** CID 350348: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jscntxt.h: 1376 in JSRuntime::realloc(void *, unsigned long, unsigned long, JSContext *)()


    ________________________________________________________________________________________________________
    *** CID 350348: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jscntxt.h: 1376 in JSRuntime::realloc(void *, unsigned long, unsigned long, JSContext *)()
    1370 }
    1371
    1372 void* realloc(void* p, size_t oldBytes, size_t newBytes, JSContext *cx = NULL) {
    1373 JS_ASSERT(oldBytes < newBytes);
    1374 updateMallocCounter(newBytes - oldBytes);
    1375 void *p2 = ::js_realloc(p, newBytes);
    CID 350348: Resource leaks (RESOURCE_LEAK)
    Variable "p2" going out of scope leaks the storage it points to.
    1376 return JS_LIKELY(!!p2) ? p2 : onOutOfMemory(p, newBytes, cx); 1377 }
    1378
    1379 void* realloc(void* p, size_t bytes, JSContext *cx = NULL) {
    1380 /*
    1381 * For compatibility we do not account for realloc that increases

    ** CID 350347: (UNINIT)


    ________________________________________________________________________________________________________
    *** CID 350347: (UNINIT) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsstr.cpp: 2517 in js::str_replace(JSContext *, unsigned int, js::Value *)()
    2511 * |RegExp| statics.
    2512 */
    2513
    2514 const FlatMatch *fm = rdata.g.tryFlatMatch(cx, rdata.str, optarg, argc, false);
    2515 if (!fm) {
    2516 if (cx->isExceptionPending()) /* oom in RopeMatch in tryFlatMatch */
    CID 350347: (UNINIT)
    Using uninitialized value "rdata.session.frame_.regs_.fp" when calling "~ReplaceData".
    2517 return false;
    2518 JS_ASSERT_IF(!rdata.g.hasRegExpPair(), argc > optarg);
    2519 return str_replace_regexp(cx, argc, vp, rdata);
    2520 }
    2521
    2522 if (fm->match() < 0) { /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsstr.cpp: 2517 in js::str_replace(JSContext *, unsigned int, js::Value *)()
    2511 * |RegExp| statics.
    2512 */
    2513
    2514 const FlatMatch *fm = rdata.g.tryFlatMatch(cx, rdata.str, optarg, argc, false);
    2515 if (!fm) {
    2516 if (cx->isExceptionPending()) /* oom in RopeMatch in tryFlatMatch */
    CID 350347: (UNINIT)
    Using uninitialized value "rdata.singleShot.prevInvokeArgEnd" when calling "~ReplaceData".
    2517 return false;
    2518 JS_ASSERT_IF(!rdata.g.hasRegExpPair(), argc > optarg);
    2519 return str_replace_regexp(cx, argc, vp, rdata);
    2520 }
    2521
    2522 if (fm->match() < 0) { /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsstr.cpp: 2443 in js::str_replace(JSContext *, unsigned int, js::Value *)()
    2437 JSBool
    2438 js::str_replace(JSContext *cx, uintN argc, Value *vp)
    2439 {
    2440 ReplaceData rdata(cx);
    2441 rdata.str = ThisToStringForStringProto(cx, vp);
    2442 if (!rdata.str)
    CID 350347: (UNINIT)
    Using uninitialized value "rdata.singleShot.prevInvokeArgEnd" when calling "~ReplaceData".
    2443 return false;
    2444 static const uint32 optarg = 2;
    2445
    2446 /* Extract replacement string/function. */
    2447 if (argc >= optarg && js_IsCallable(vp[3])) {
    2448 rdata.lambda = &vp[3].toObject(); /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsstr.cpp: 2443 in js::str_replace(JSContext *, unsigned int, js::Value *)()
    2437 JSBool
    2438 js::str_replace(JSContext *cx, uintN argc, Value *vp)
    2439 {
    2440 ReplaceData rdata(cx);
    2441 rdata.str = ThisToStringForStringProto(cx, vp);
    2442 if (!rdata.str)
    CID 350347: (UNINIT)
    Using uninitialized value "rdata.session.frame_.regs_.fp" when calling "~ReplaceData".
    2443 return false;
    2444 static const uint32 optarg = 2;
    2445
    2446 /* Extract replacement string/function. */
    2447 if (argc >= optarg && js_IsCallable(vp[3])) {
    2448 rdata.lambda = &vp[3].toObject();

    ** CID 350346: (UNINIT)


    ________________________________________________________________________________________________________
    *** CID 350346: (UNINIT) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsreflect.cpp: 2165 in js::ASTSerializer::statement(JSParseNode *, js::Value *)()
    2159
    2160 case TOK_WITH:
    2161 case TOK_WHILE:
    2162 {
    2163 Value expr, stmt;
    2164
    CID 350346: (UNINIT)
    Using uninitialized value "stmt" when calling "whileStatement".
    2165 return expression(pn->pn_left, &expr) &&
    2166 statement(pn->pn_right, &stmt) &&
    2167 (PN_TYPE(pn) == TOK_WITH)
    2168 ? builder.withStatement(expr, stmt, &pn->pn_pos, dst) 2169 : builder.whileStatement(expr, stmt, &pn->pn_pos, dst); 2170 } /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsreflect.cpp: 2165 in js::ASTSerializer::statement(JSParseNode *, js::Value *)()
    2159
    2160 case TOK_WITH:
    2161 case TOK_WHILE:
    2162 {
    2163 Value expr, stmt;
    2164
    CID 350346: (UNINIT)
    Using uninitialized value "stmt.data" when calling "whileStatement". 2165 return expression(pn->pn_left, &expr) &&
    2166 statement(pn->pn_right, &stmt) &&
    2167 (PN_TYPE(pn) == TOK_WITH)
    2168 ? builder.withStatement(expr, stmt, &pn->pn_pos, dst) 2169 : builder.whileStatement(expr, stmt, &pn->pn_pos, dst); 2170 }

    ** CID 350345: Memory - corruptions (OVERRUN)


    ________________________________________________________________________________________________________
    *** CID 350345: Memory - corruptions (OVERRUN) /tmp/sbbs-Mar-01-2022/3rdp/src/cl/bn/bn_mul.c: 1130 in BN_mul()
    1124 rr->top = top;
    1125 bn_mul_normal(rr->d, a->d, al, b->d, bl);
    1126
    1127 #if defined(BN_MUL_COMBA) || defined(BN_RECURSION)
    1128 end:
    1129 #endif
    CID 350345: Memory - corruptions (OVERRUN)
    Overrunning callee's array of size 72 by passing argument "rr->top" (which evaluates to 272) in call to "BN_normalise".
    1130 bn_correct_top(rr);
    1131 if (r != rr)
    1132 BN_copy(r, rr);
    1133 ret = 1;
    1134 err:
    1135 bn_check_top(r);

    ** CID 350344: Uninitialized variables (UNINIT)


    ________________________________________________________________________________________________________
    *** CID 350344: Uninitialized variables (UNINIT) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/methodjit/Compiler.cpp: 3355 in js::mjit::Compiler::jsop_callprop_obj(JSAtom *)()
    3349 labels.setInlineShapeJump(masm, inlineShapeLabel, inlineShapeJump);
    3350 #else
    3351 labels.setInlineShapeJump(masm, pic.shapeGuard, inlineShapeJump); 3352 #endif
    3353
    3354 stubcc.rejoin(Changes(2));
    CID 350344: Uninitialized variables (UNINIT)
    Using uninitialized value "pic". Field "pic.vr" is uninitialized when calling "append".
    3355 pics.append(pic);
    3356
    3357 return true;
    3358 }
    3359
    3360 bool

    ** CID 350343: Uninitialized variables (UNINIT)


    ________________________________________________________________________________________________________
    *** CID 350343: Uninitialized variables (UNINIT)
    /js_system.c: 1922 in js_chkname()
    1916
    1917 js_system_private_t* sys;
    1918 if((sys = (js_system_private_t*)js_GetClassPrivate(cx,obj,&js_system_class))==NULL)
    1919 return JS_FALSE;
    1920
    1921 rc=JS_SUSPENDREQUEST(cx);
    CID 350343: Uninitialized variables (UNINIT)
    Using uninitialized value "*str" when calling "check_name".
    1922 JS_SET_RVAL(cx, arglist, BOOLEAN_TO_JSVAL(check_name(sys->cfg,str)));
    1923 JS_RESUMEREQUEST(cx, rc);
    1924
    1925 return(JS_TRUE);
    1926 }
    1927

    ** CID 350342: Uninitialized variables (UNINIT)


    ________________________________________________________________________________________________________
    *** CID 350342: Uninitialized variables (UNINIT)
    /mailsrvr.c: 3160 in smtp_thread()
    3154 return;
    3155 }
    3156
    3157 if(trashcan(&scfg,host_name,"smtpspy")
    3158 || trashcan(&scfg,host_ip,"smtpspy")) {
    3159 SAFEPRINTF2(path,"%s%sspy.txt", scfg.logs_dir, client.protocol);
    CID 350342: Uninitialized variables (UNINIT)
    Using uninitialized value "*str" when calling "strlwr".
    3160 strlwr(str);
    3161 spy=fopen(str,"a");
    3162 }
    3163
    3164 /* Initialize client display */
    3165 client.size=sizeof(client);

    ** CID 350341: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jscntxt.h: 1369 in JSRuntime::calloc(unsigned long, JSContext *)()


    ________________________________________________________________________________________________________
    *** CID 350341: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jscntxt.h: 1369 in JSRuntime::calloc(unsigned long, JSContext *)()
    1363 * Call the system calloc while checking for GC memory pressure and
    1364 * reporting OOM error when cx is not null.
    1365 */
    1366 void* calloc(size_t bytes, JSContext *cx = NULL) {
    1367 updateMallocCounter(bytes);
    1368 void *p = ::js_calloc(bytes);
    CID 350341: Resource leaks (RESOURCE_LEAK)
    Variable "p" going out of scope leaks the storage it points to.
    1369 return JS_LIKELY(!!p) ? p : onOutOfMemory(reinterpret_cast<void *>(1), bytes, cx);
    1370 }
    1371
    1372 void* realloc(void* p, size_t oldBytes, size_t newBytes, JSContext *cx = NULL) {
    1373 JS_ASSERT(oldBytes < newBytes);
    1374 updateMallocCounter(newBytes - oldBytes);

    ** CID 350340: Memory - illegal accesses (OVERRUN) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsopcode.cpp: 5408 in SimulateImacroCFG(JSContext *, JSScript *, unsigned int, unsigned char *, unsigned char *, unsigned char **)()


    ________________________________________________________________________________________________________
    *** CID 350340: Memory - illegal accesses (OVERRUN) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsopcode.cpp: 5408 in SimulateImacroCFG(JSContext *, JSScript *, unsigned int, unsigned char *, unsigned char *, unsigned char **)()
    5402 }
    5403
    5404 ptrdiff_t oplen;
    5405 for (; pc < target; pc += oplen) {
    5406 JSOp op = js_GetOpcode(cx, script, pc);
    5407 const JSCodeSpec *cs = &js_CodeSpec[op];
    CID 350340: Memory - illegal accesses (OVERRUN)
    Overrunning array of 1952 bytes at byte offset 2040 by dereferencing pointer "cs".
    5408 oplen = cs->length;
    5409 if (oplen < 0)
    5410 oplen = js_GetVariableBytecodeLength(pc);
    5411
    5412 if (SimulateOp(cx, script, op, cs, pc, tmp_pcstack, pcdepth) < 0)
    5413 goto failure;

    ** CID 350339: Uninitialized variables (UNINIT)


    ________________________________________________________________________________________________________
    *** CID 350339: Uninitialized variables (UNINIT) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/methodjit/Compiler.cpp: 3528 in js::mjit::Compiler::jsop_name(JSAtom *)()
    3522 labels.setInlineJump(masm, pic.fastPathStart, inlineJump);
    3523
    3524 frame.pushRegs(pic.shapeReg, pic.objReg);
    3525
    3526 stubcc.rejoin(Changes(1));
    3527
    CID 350339: Uninitialized variables (UNINIT)
    Using uninitialized value "pic". Field "pic.pc" is uninitialized when calling "append".
    3528 pics.append(pic);
    3529 }
    3530
    3531 bool
    3532 mjit::Compiler::jsop_xname(JSAtom *atom)
    3533 {

    ** CID 350338: (USE_AFTER_FREE)


    ________________________________________________________________________________________________________
    *** CID 350338: (USE_AFTER_FREE) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsdtoa.cpp: 506 in js_dtobasestr()
    500 if (j1 > 0) {
    501 /* Either dig or dig+1 would work here as the least significant digit.
    502 Use whichever would produce an output value closer to d. */
    503 b = lshift(PASS_STATE b, 1);
    504 if (!b)
    505 goto nomem2;
    CID 350338: (USE_AFTER_FREE)
    Calling "cmp" dereferences freed pointer "s".
    506 j1 = cmp(b, s);
    507 if (j1 > 0) /* The even test (|| (j1 == 0 && (digit & 1))) is not here because it messes up odd base output
    508 * such as 3.5 in base 3. */
    509 digit++;
    510 }
    511 done = JS_TRUE; /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsdtoa.cpp: 481 in js_dtobasestr()
    475 goto nomem2;
    476 }
    477
    478 /* Do we yet have the shortest string that will round to d? */
    479 j = cmp(b, mlo);
    480 /* j is b/2^s2 compared with mlo/2^s2. */
    CID 350338: (USE_AFTER_FREE)
    Calling "diff" dereferences freed pointer "s".
    481 delta = diff(PASS_STATE s, mhi);
    482 if (!delta)
    483 goto nomem2;
    484 j1 = delta->sign ? 1 : cmp(b, delta);
    485 Bfree(PASS_STATE delta);
    486 /* j1 is b/2^s2 compared with 1 - mhi/2^s2. */ /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jsdtoa.cpp: 481 in js_dtobasestr()
    475 goto nomem2;
    476 }
    477
    478 /* Do we yet have the shortest string that will round to d? */
    479 j = cmp(b, mlo);
    480 /* j is b/2^s2 compared with mlo/2^s2. */
    CID 350338: (USE_AFTER_FREE)
    Calling "diff" dereferences freed pointer "s".
    481 delta = diff(PASS_STATE s, mhi);
    482 if (!delta)
    483 goto nomem2;
    484 j1 = delta->sign ? 1 : cmp(b, delta);
    485 Bfree(PASS_STATE delta);
    486 /* j1 is b/2^s2 compared with 1 - mhi/2^s2. */

    ** CID 350337: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jscntxt.h: 1359 in JSRuntime::malloc(unsigned long, JSContext *)()


    ________________________________________________________________________________________________________
    *** CID 350337: Resource leaks (RESOURCE_LEAK) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/jscntxt.h: 1359 in JSRuntime::malloc(unsigned long, JSContext *)()
    1353 * Call the system malloc while checking for GC memory pressure and
    1354 * reporting OOM error when cx is not null.
    1355 */
    1356 void* malloc(size_t bytes, JSContext *cx = NULL) {
    1357 updateMallocCounter(bytes);
    1358 void *p = ::js_malloc(bytes);
    CID 350337: Resource leaks (RESOURCE_LEAK)
    Variable "p" going out of scope leaks the storage it points to.
    1359 return JS_LIKELY(!!p) ? p : onOutOfMemory(NULL, bytes, cx); 1360 }
    1361
    1362 /*
    1363 * Call the system calloc while checking for GC memory pressure and
    1364 * reporting OOM error when cx is not null.

    ** CID 350336: Uninitialized variables (UNINIT)
    /main.cpp: 2755 in event_thread(void *)()


    ________________________________________________________________________________________________________
    *** CID 350336: Uninitialized variables (UNINIT)
    /main.cpp: 2755 in event_thread(void *)()
    2749 SAFEPRINTF3(str,"%sfile%c%04u.qwk"
    2750 ,sbbs->cfg.data_dir,PATH_DELIM,sbbs->useron.number);
    2751 if(sbbs->pack_qwk(str,&l,true /* pre-pack/off-line */)) {
    2752 sbbs->lprintf(LOG_INFO, "Packing completed: %s", str);
    2753 sbbs->qwk_success(l,0,1);
    2754 sbbs->putmsgptrs();
    CID 350336: Uninitialized variables (UNINIT)
    Using uninitialized value "*bat_list" when calling "remove".
    2755 remove(bat_list);
    2756 } else
    2757 sbbs->lputs(LOG_INFO, "No packet created (no new messages)");
    2758 sbbs->delfiles(sbbs->cfg.temp_dir,ALLFILES);
    2759 sbbs->console&=~CON_L_ECHO; 2760 sbbs->online=FALSE;

    ** CID 350335: Memory - corruptions (OVERRUN)


    ________________________________________________________________________________________________________
    *** CID 350335: Memory - corruptions (OVERRUN) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/nanojit/Assembler.cpp: 716 in nanojit::Assembler::freeResourcesOf(nanojit::LIns *)()
    710 }
    711
    712 // Frees all record of registers and spill slots used by 'ins'.
    713 void Assembler::freeResourcesOf(LIns *ins)
    714 {
    715 if (ins->isInReg()) {
    CID 350335: Memory - corruptions (OVERRUN)
    Overrunning callee's array of size 32 by passing argument "ins->getReg()" (which evaluates to 127) in call to "retire".
    716 _allocator.retire(ins->getReg()); // free any register associated with entry
    717 ins->clearReg();
    718 }
    719 if (ins->isInAr()) {
    720 arFree(ins); // free any AR space associated with entry
    721 ins->clearArIndex();

    ** CID 350334: (USE_AFTER_FREE) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/dtoa.c: 3095 in dtoa(DtoaState *, U, int, int, int *, int *, char **)()


    ________________________________________________________________________________________________________
    *** CID 350334: (USE_AFTER_FREE) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/dtoa.c: 3108 in dtoa(DtoaState *, U, int, int, int *, int *, char **)()
    3102 for(i = 1;;i++) {
    3103 dig = quorem(b,S) + '0';
    3104 /* Do we yet have the shortest decimal string 3105 * that will round to d?
    3106 */
    3107 j = cmp(b, mlo);
    CID 350334: (USE_AFTER_FREE)
    Calling "diff" dereferences freed pointer "mhi".
    3108 delta = diff(PASS_STATE S, mhi);
    3109 j1 = delta->sign ? 1 : cmp(b, delta);
    3110 Bfree(PASS_STATE delta);
    3111 #ifndef ROUND_BIASED
    3112 if (j1 == 0 && mode != 1 && !(word1(d) & 1) 3113 #ifdef Honor_FLT_ROUNDS /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/dtoa.c: 3108 in dtoa(DtoaState *, U, int, int, int *, int *, char **)()
    3102 for(i = 1;;i++) {
    3103 dig = quorem(b,S) + '0';
    3104 /* Do we yet have the shortest decimal string 3105 * that will round to d?
    3106 */
    3107 j = cmp(b, mlo);
    CID 350334: (USE_AFTER_FREE)
    Calling "diff" dereferences freed pointer "mhi".
    3108 delta = diff(PASS_STATE S, mhi);
    3109 j1 = delta->sign ? 1 : cmp(b, delta);
    3110 Bfree(PASS_STATE delta);
    3111 #ifndef ROUND_BIASED
    3112 if (j1 == 0 && mode != 1 && !(word1(d) & 1) 3113 #ifdef Honor_FLT_ROUNDS /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/dtoa.c: 3095 in dtoa(DtoaState *, U, int, int, int *, int *, char **)()
    3089 mhi = lshift(PASS_STATE mhi, m2);
    3090
    3091 /* Compute mlo -- check for special case
    3092 * that d is a normalized power of 2.
    3093 */
    3094
    CID 350334: (USE_AFTER_FREE)
    Using freed pointer "mhi".
    3095 mlo = mhi;
    3096 if (spec_case) {
    3097 mhi = Balloc(PASS_STATE mhi->k);
    3098 Bcopy(mhi, mlo);
    3099 mhi = lshift(PASS_STATE mhi, Log2P);
    3100 }

    ** CID 350333: Uninitialized variables (UNINIT)


    ________________________________________________________________________________________________________
    *** CID 350333: Uninitialized variables (UNINIT)
    /js_socket.c: 1817 in js_getsockopt()
    1811 if((p=(js_socket_private_t*)js_GetClassPrivate(cx, obj, &js_socket_class))==NULL) {
    1812 return(JS_FALSE);
    1813 }
    1814
    1815 rc=JS_SUSPENDREQUEST(cx);
    1816 JSVALUE_TO_ASTRING(cx, argv[0], cstr, 64, NULL);
    CID 350333: Uninitialized variables (UNINIT)
    Using uninitialized value "*cstr" when calling "getSocketOptionByName". 1817 if((opt = getSocketOptionByName(cstr, &level)) == -1) {
    1818 JS_RESUMEREQUEST(cx, rc);
    1819 return(JS_TRUE);
    1820 }
    1821
    1822 if(opt == SO_LINGER) {

    ** CID 350332: (OVERRUN)


    ________________________________________________________________________________________________________
    *** CID 350332: (OVERRUN) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/nanojit/Assembler.cpp: 542 in nanojit::Assembler::findRegFor(nanojit::LIns *, unsigned int)()
    536 //
    537 // pre-state: ecx(ins)
    538 // instruction: mov eax, ecx
    539 // post-state: eax(ins)
    540 //
    541 Register s = r;
    CID 350332: (OVERRUN)
    Overrunning callee's array of size 32 by passing argument "r" (which evaluates to 127) in call to "retire".
    542 _allocator.retire(r);
    543 r = registerAlloc(ins, allow, hint(ins));
    544
    545 // 'ins' is in 'allow', in register r (different to the old r);
    546 // s is the old r.
    547 if ((rmask(s) & GpRegs) && (rmask(r) & GpRegs)) { /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/nanojit/Assembler.cpp: 511 in nanojit::Assembler::findRegFor(nanojit::LIns *, unsigned int)()
    505 if (!ins->isInReg()) {
    506 // 'ins' isn't in a register (must be in a spill slot or nowhere).
    507 r = registerAlloc(ins, allow, hint(ins));
    508
    509 } else if (rmask(r = ins->getReg()) & allow) {
    510 // 'ins' is in an allowed register.
    CID 350332: (OVERRUN)
    Overrunning callee's array of size 32 by passing argument "r" (which evaluates to 127) in call to "useActive".
    511 _allocator.useActive(r);
    512
    513 } else {
    514 // 'ins' is in a register (r) that's not in 'allow'.
    515 #ifdef NANOJIT_IA32
    516 if (((rmask(r)&XmmRegs) && !(allow&XmmRegs)) ||

    ** CID 350331: Memory - corruptions (OVERRUN)


    ________________________________________________________________________________________________________
    *** CID 350331: Memory - corruptions (OVERRUN) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/nanojit/Assembler.cpp: 255 in nanojit::Assembler::registerAlloc(nanojit::LIns *, unsigned int, unsigned int)()
    249 r = vic->getReg();
    250
    251 evict(vic);
    252
    253 // r ends up staying active, but the LIns defining it changes.
    254 _allocator.removeFree(r);
    CID 350331: Memory - corruptions (OVERRUN)
    Overrunning callee's array of size 32 by passing argument "r" (which evaluates to 127) in call to "addActive".
    255 _allocator.addActive(r, ins);
    256 ins->setReg(r);
    257 }
    258
    259 return r;
    260 }

    ** CID 350330: Error handling issues (CHECKED_RETURN) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/methodjit/StubCalls.cpp: 2114 in InitPropOrMethod(js::VMFrame &, JSAtom *, JSOp)()


    ________________________________________________________________________________________________________
    *** CID 350330: Error handling issues (CHECKED_RETURN) /tmp/sbbs-Mar-01-2022/3rdp/src/mozjs/js-1.8.5/js/src/methodjit/StubCalls.cpp: 2114 in InitPropOrMethod(js::VMFrame &, JSAtom *, JSOp)()
    2108 /* Get the immediate property name into id. */
    2109 jsid id = ATOM_TO_JSID(atom);
    2110
    2111 uintN defineHow = (op == JSOP_INITMETHOD)
    2112 ? JSDNP_CACHE_RESULT | JSDNP_SET_METHOD
    2113 : JSDNP_CACHE_RESULT;
    CID 350330: Error handling issues (CHECKED_RETURN)
    Calling "js_SetPropertyHelper" without checking return value (as is done elsewhere 4 out of 5 times).
    2114 if (!(JS_UNLIKELY(atom == cx->runtime->atomState.protoAtom) 2115 ? js_SetPropertyHelper(cx, obj, id, defineHow, &rval, false)
    2116 : js_DefineNativeProperty(cx, obj, id, rval, NULL, NULL, 2117 JSPROP_ENUMERATE, 0, 0, NULL, 2118 defineHow))) {
    2119 THROW();


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DEMqw_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCP-2B8OHIldljvVVL5cQeE6UT0WnQ1RNbqLoTxk-2FeL9PEk8n4H0FlfdjUpDUESHU7jfONTBkfwWnTxTnSwiEf8HMCaPWxKHWwiX5TlAgpBxAxNxqOwpiuqloQotGWODdOqhlmv0xc95f00sygbqs-2B5cr6DKQDu2jc96LxrO4bOzQnQ-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed Mar 2 13:56:03 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    1 new defect(s) introduced to Synchronet found with Coverity Scan.
    26 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 1 of 1 defect(s)


    ** CID 350353: Error handling issues (NEGATIVE_RETURNS)
    /sbbsecho.c: 3629 in getzpt()


    ________________________________________________________________________________________________________
    *** CID 350353: Error handling issues (NEGATIVE_RETURNS)
    /sbbsecho.c: 3629 in getzpt()
    3623 }
    3624 if(buf[i]=='\r')
    3625 cr=1;
    3626 else
    3627 cr=0;
    3628 }
    CID 350353: Error handling issues (NEGATIVE_RETURNS)
    "pos" is passed to a parameter that cannot be negative.
    3629 (void)fseeko(stream,pos,SEEK_SET);
    3630 return intl_found;
    3631 }
    3632
    3633 bool foreign_zone(uint16_t zone1, uint16_t zone2)
    3634 {


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DmiUV_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCREBxNEUgdt5ZQ6Jwp6-2F2dgB3N1R09JHnkRI8obVHKr9rLWEOifV40DEpPVOO0-2FraqrnSN-2BnhUTXyIvrlQ4autpeTHdQl6YDJk0BRrodCTUzq7DK-2F5i4TI7jqqdybEo8XFc066P6h-2BWGjEKMxgiHVWXtJf16Bn6nRGWXloCyW5Sg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Mar 3 13:54:50 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    3 new defect(s) introduced to Synchronet found with Coverity Scan.
    23 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 3 of 3 defect(s)


    ** CID 350413: Error handling issues (CHECKED_RETURN)
    /smbutil.c: 1208 in packmsgs()


    ________________________________________________________________________________________________________
    *** CID 350413: Error handling issues (CHECKED_RETURN)
    /smbutil.c: 1208 in packmsgs()
    1202 if(offset < 0) {
    1203 fprintf(errfp,"\n%s!Data allocation failure: %ld\n", beep, (long)offset);
    1204 continue;
    1205 }
    1206 datoffset[datoffsets].new = (uint32_t)offset;
    1207 datoffsets++;
    CID 350413: Error handling issues (CHECKED_RETURN)
    Calling "fseeko(tmp_sdt, offset, 0)" without checking return value. This library function may fail and return an error code.
    1208 fseeko(tmp_sdt, offset, SEEK_SET);
    1209 }
    1210 else {
    1211 fseek(tmp_sdt,0L,SEEK_END);
    1212 offset = ftello(tmp_sdt);
    1213 if(offset < 0) {

    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-03-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-03-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-03-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-03-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DD47W_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCSrijcu7bXGqi81OTBzOPBjXC3lWUuu5-2BXvKRt4FwjyPDf0g9xky4HQ0WtVouLRWmck1Ycykgk-2FaRQTwHwDaWNmkgdjrEM471gEiGAjjmwUICC8KGfeOt7sKwnsIZs4JW6l0pvrNJkOCwyjTGMjbzCH-2Bi1uRDonCgn-2FyD3M7dqtA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Sun Mar 6 13:56:16 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-06-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-06-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-06-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-06-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DGZmf_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrB-2FE93deCeVJSOK4GeykkZSfz13YUWn5gfaUBcFTSXXKkKO2DjnNJQYessG1TKOvN45D1867ZL9Z0EXmszWk9qtSbmOYOll1SGuHXUe5gSamYqVz-2FReX-2BYS9Ar9ZtY1bbpPOSjU01u3kspVY0sdJLdQDgLZw68KIVC-2FzLYHG0d0n-2FZbrtQLNIJ0YjzIrTOswrE-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Tue Mar 8 13:55:56 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-08-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-08-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-08-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-08-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3Dqp4w_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrDxbPSb0xy-2FqI-2FyNL5NDpSNKkJTR0FUVvi-2FoErGXhV79WhSncGrrgvggywwoEkzh8kkXq04p9W4M47AUIJxVpMtR39huOqsR4osHyy-2BiRDpC6Lay-2FVwV6z-2BvLUOMvj8ylZPGnxoCBj9-2BcgsuzrqrTDgB5abbbYwKEg-2BoVzbDoM32Q-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri Mar 11 13:55:28 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-11-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-11-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-11-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-11-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DPYf4_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrB-2F1eaNePyAzxB9G0QBKI-2BxgslMFW9jdo0iy1q6QTrEdZaVcfvJ41KOTHvrm7SheZUyvE5enZ45-2FVVsWM-2BQjzr5ySmKxKQyXSHrviuUmjusTTm-2FCEgTUXwYb2p3QQ5-2FmGMmuIQJ6ov9zjWFIWXQPR3nv7UTPEl4cMiZa7fnognhMg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon Mar 14 12:54:56 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-14-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-14-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-14-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-14-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DrTez_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBzePTeq7-2Bqo0W1jZZcsP1WL0c5-2BSPOmYJbiDNUJLCbPKmTr7zp2D9sdLyxtx-2B5mjbwbkBBCHimFd2RgGXLNkX-2FQj-2Fh1N2hgO6ZoZlOu8BbEewAkxJBBczHJHgsQ1t-2Fgh14dd9HSuBwK8RZNgqLUxim1O5Krer9hnF8CmDBJSmIAg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Fri Mar 18 12:53:08 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-18-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-18-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-18-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-18-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D1pfM_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrA18gmU5Pbu9BTDBJBVOQuAHGOY8lFwtAjgGb7o3Un35AqiFI6s5UMyj7Z0ZNf5G8TMktafsulQOV4p-2FclLp03FumVzHBAcfRkyewZhOnf7iynwCP4FENe8FbVn-2FnrCI-2BfvvnB-2Bjoc71R7KhMPelOf4KacPdBc4WZxmQA8dIGeDOg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Wed Mar 23 23:05:35 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    3 new defect(s) introduced to Synchronet found with Coverity Scan.
    5 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 3 of 3 defect(s)


    ** CID 350813: Error handling issues (CHECKED_RETURN)
    /js_system.c: 373 in js_system_set()


    ________________________________________________________________________________________________________
    *** CID 350813: Error handling issues (CHECKED_RETURN)
    /js_system.c: 373 in js_system_set()
    367 JS_IdToValue(cx, id, &idval);
    368 tiny = JSVAL_TO_INT(idval);
    369
    370 #ifndef JSDOOR
    371 switch(tiny) {
    372 case SYS_PROP_MISC:
    CID 350813: Error handling issues (CHECKED_RETURN)
    Calling "JS_ValueToECMAUint32" without checking return value (as is done elsewhere 68 out of 71 times).
    373 JS_ValueToECMAUint32(cx, *vp, (uint32_t*)&sys->cfg->sys_misc);
    374 break;
    375 case SYS_PROP_OP_AVAIL:
    376 if(!set_sysop_availability(sys->cfg, JSVAL_TO_BOOLEAN(*vp))) {
    377 JS_ReportError(cx, "%s: Failed to set sysop availability", __FUNCTION__);
    378 return JS_FALSE;

    ** CID 350812: Error handling issues (CHECKED_RETURN)
    /js_system.c: 1198 in js_secondstr()


    ________________________________________________________________________________________________________
    *** CID 350812: Error handling issues (CHECKED_RETURN)
    /js_system.c: 1198 in js_secondstr()
    1192 return JS_FALSE;
    1193
    1194 if(JSVAL_NULL_OR_VOID(argv[0])) {
    1195 JS_ReportError(cx, "Invalid argument");
    1196 return JS_FALSE;
    1197 }
    CID 350812: Error handling issues (CHECKED_RETURN)
    Calling "JS_ValueToECMAUint32" without checking return value (as is done elsewhere 68 out of 71 times).
    1198 JS_ValueToECMAUint32(cx,argv[0],&t);
    1199 sectostr(t,str);
    1200 if((js_str = JS_NewStringCopyZ(cx, str))==NULL)
    1201 return(JS_FALSE);
    1202
    1203 JS_SET_RVAL(cx, arglist, STRING_TO_JSVAL(js_str));

    ** CID 350811: Error handling issues (CHECKED_RETURN)
    /js_system.c: 1171 in js_datestr()


    ________________________________________________________________________________________________________
    *** CID 350811: Error handling issues (CHECKED_RETURN)
    /js_system.c: 1171 in js_datestr()
    1165 else {
    1166 if(JSVAL_IS_STRING(argv[0])) { /* convert from string to time_t? */
    1167 JSVALUE_TO_ASTRING(cx, argv[0], p, 10, NULL); 1168 JS_SET_RVAL(cx, arglist, DOUBLE_TO_JSVAL((double)dstrtounix(sys->cfg, p)));
    1169 return(JS_TRUE);
    1170 }
    CID 350811: Error handling issues (CHECKED_RETURN)
    Calling "JS_ValueToECMAUint32" without checking return value (as is done elsewhere 68 out of 71 times).
    1171 JS_ValueToECMAUint32(cx,argv[0],(uint32_t*)&t);
    1172 }
    1173 unixtodstr(sys->cfg,t,str);
    1174 if((js_str = JS_NewStringCopyZ(cx, str))==NULL)
    1175 return(JS_FALSE);
    1176


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DO-T-_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrD5lmQkwtzbpuckFzICuBb-2BrzHxNzOQGFWU1wii6NtUwUINnM1SD13bgyTn-2F0F7qCyOVMOWvJkz8JpmgGX7IMstkqknb7-2FOCJJ4b-2BForC6hd6cNSyW5oO2x4Mpuy8QqNdzyI5-2FKFN3KrApvvfnbJilV7OSnsAMQKp00hkOCYfuisA-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Thu Mar 24 12:51:58 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    2 new defect(s) introduced to Synchronet found with Coverity Scan.


    New defect(s) Reported-by: Coverity Scan
    Showing 2 of 2 defect(s)


    ** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-24-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319807: Memory - illegal accesses (UNINIT) /tmp/sbbs-Mar-24-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319807: Memory - illegal accesses (UNINIT)
    Using uninitialized value "res" when calling "uname".
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true

    ** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-24-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main()


    ________________________________________________________________________________________________________
    *** CID 319786: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-24-2022/3rdp/src/mozjs/js-1.8.5/js/src/configure: 9243 in main() 9237 cat > conftest.$ac_ext <<EOF
    9238 #line 9239 "configure"
    9239 #include "confdefs.h"
    9240 #include <sys/utsname.h>
    9241 int main() {
    9242 struct utsname *res; char *domain;
    CID 319786: Null pointer dereferences (REVERSE_INULL)
    Null-checking "res" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    9243 (void)uname(res); if (res != 0) { domain = res->domainname; }
    9244 ; return 0; }
    9245 EOF
    9246 if { (eval echo configure:9247: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
    9247 rm -rf conftest*
    9248 ac_cv_have_uname_domainname_field=true


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3DFP18_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrCflBuMVNA6gDC8IkyOIv-2FWsZJtVrBVHx97YtTpWpI-2Fu3nNS-2FqY3yfobcKRm6HbTvMZ-2FNxJk-2BjsOlUxrvqOMjC6GwHEaFA4-2Bu0A1iCRP2ePoR9QzO8HXb0iwm41A8qelmaDuGsti2VRtEmawfbYpdd1ZBFkJ4y3ti6y7-2Bb4Iy0feg-3D-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From scan-admin@coverity.com@VERT to cov-scan@synchro.net on Mon Mar 28 12:55:29 2022
    Hi,

    Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.

    1 new defect(s) introduced to Synchronet found with Coverity Scan.
    11 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

    New defect(s) Reported-by: Coverity Scan
    Showing 1 of 1 defect(s)


    ** CID 351271: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-28-2022/src/xpdev/dirwrap.c: 319 in globi()


    ________________________________________________________________________________________________________
    *** CID 351271: Null pointer dereferences (REVERSE_INULL) /tmp/sbbs-Mar-28-2022/src/xpdev/dirwrap.c: 319 in globi()
    313 glob_t *g)
    314 {
    315 char pattern[MAX_PATH * 2] = "";
    316 int len = 0;
    317 char* fname = getfname(p);
    318
    CID 351271: Null pointer dereferences (REVERSE_INULL)
    Null-checking "p" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
    319 if(p != NULL) {
    320 while(*p != '\0' && len < MAX_PATH) {
    321 if(p >= fname && IS_ALPHA(*p))
    322 len += sprintf(pattern + len, "[%c%c]", toupper(*p), tolower(*p));
    323 else
    324 pattern[len++] = *p;


    ________________________________________________________________________________________________________
    To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D3MQr_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrBHCLgLiAqWvsdsSvMvtYRCVKtxNV9b8XfYRQl1Ph-2BqJxQ0Ygv34l5-2Fu4fQtvx42Zh-2BRqVcRiGi7S56cijYNtVbyD93ITXFymk8m5C7-2FMScQUBSp3YH64ZEI9TV8-2FzGIfTTZKmGolrhJJ9NnUb4cpVgmkjY8SxgJG-2BJjiOIj1S6-2F1wje55yIH-2FtPFPTWUFvz7Y-3D



    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net
  • From DesotoFireflite@VERT/VALHALLA to Digital Man on Fri Aug 26 12:15:07 2022
    Re: New Defects reported by Coverity Scan for Synchronet
    By: scan-admin@coverity.com to cov-scan@synchro.net on Fri Aug 26 2022 12:51 pm

    Just curious, should we avoid updating on days where coverity scan finds errors.

    SysOp: C.G. Learn, AKA: DesotoFireflite
    Valhalla Home Services! - (Synchronet) - bbs.valhallabbs.com:23
    A Gamers Paradise - Over 250 Registered Online Game Doors!

    --- Don't eat the yellow snow!
    ■ Synchronet ■ Valhalla Home Services ■ USA ■ http://valhalla.synchro.net
  • From Digital Man@VERT to DesotoFireflite on Fri Aug 26 20:14:17 2022
    Re: New Defects reported by Coverity Scan for Synchronet
    By: DesotoFireflite to Digital Man on Fri Aug 26 2022 12:15 pm

    Just curious, should we avoid updating on days where coverity scan finds errors.

    If they're new errors, then maybe so, but those same 2 errors in the js/configure stuff keep popping up and then are flagged as resolved, over and over, even though I have the 3rd party stuff excluded from scan results. Just looks like a Coverity bug in that case and you can ignore those 2 errors specifically. Someday when we upgrade the JS library, they'll likely go away.
    --
    digital man (rob)

    Rush quote #32:
    Begging hands and bleeding hearts will only cry out for more
    Norco, CA WX: 76.2°F, 59.0% humidity, 4 mph S wind, 0.00 inches rain/24hrs
    ---
    ■ Synchronet ■ Vertrauen ■ Home of Synchronet ■ [vert/cvs/bbs].synchro.net