Hi,
Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.
3 new defect(s) introduced to Synchronet found with Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 3 of 3 defect(s)
** CID 331093: Null pointer dereferences (FORWARD_NULL)
________________________________________________________________________________________________________
*** CID 331093: Null pointer dereferences (FORWARD_NULL)
/js_filebase.c: 787 in js_format_file_name()
781 char* buf = calloc(size + 1, 1);
782 if(buf == NULL) {
783 JS_ReportError(cx, "malloc failure: %d", size + 1);
784 return JS_FALSE;
785 }
786 JSString* js_str;
>>> CID 331093: Null pointer dereferences (FORWARD_NULL)
>>> Passing null pointer "filepath" to "getfname", which dereferences it.
787 if((js_str = JS_NewStringCopyZ(cx, format_filename(getfname(filepath), buf, size, pad))) != NULL)
788 JS_SET_RVAL(cx, arglist, STRING_TO_JSVAL(js_str));
789 free(buf);
790
791 return JS_TRUE;
792 }
** CID 331092: Error handling issues (CHECKED_RETURN)
/js_filebase.c: 770 in js_format_file_name()
________________________________________________________________________________________________________
*** CID 331092: Error handling issues (CHECKED_RETURN)
/js_filebase.c: 770 in js_format_file_name()
764
765 uintN argn = 0;
766 JSVALUE_TO_MSTRING(cx, argv[argn], filepath, NULL);
767 HANDLE_PENDING(cx, filepath);
768 argn++;
769 if(argn < argc && JSVAL_IS_NUMBER(argv[argn])) {
>>> CID 331092: Error handling issues (CHECKED_RETURN)
>>> Calling "JS_ValueToInt32" without checking return value (as is done elsewhere 251 out of 286 times).
770 JS_ValueToInt32(cx, argv[argn], &size);
771 argn++;
772 }
773 if(argn < argc && JSVAL_IS_BOOLEAN(argv[argn])) {
774 pad = JSVAL_TO_BOOLEAN(argv[argn]);
775 argn++;
** CID 331091: Resource leaks (RESOURCE_LEAK)
/js_filebase.c: 791 in js_format_file_name()
________________________________________________________________________________________________________
*** CID 331091: Resource leaks (RESOURCE_LEAK)
/js_filebase.c: 791 in js_format_file_name()
785 }
786 JSString* js_str;
787 if((js_str = JS_NewStringCopyZ(cx, format_filename(getfname(filepath), buf, size, pad))) != NULL)
788 JS_SET_RVAL(cx, arglist, STRING_TO_JSVAL(js_str));
789 free(buf);
790
>>> CID 331091: Resource leaks (RESOURCE_LEAK)
>>> Variable "filepath" going out of scope leaks the storage it points to.
791 return JS_TRUE;
792 }
793
794 static JSBool
795 js_get_file_path(JSContext *cx, uintN argc, jsval *arglist)
796 {
________________________________________________________________________________________________________
To view the defects in Coverity Scan visit, https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yp-2FP9gGRhvFklLaQKuBylUrkMFB3WMR2p7qIYKYTZrh4BbWTBf-2B-2Fi5ZUVF-2Fo-2B6flxo-3D_3Y-_g4j7BHlu96plUOfCQsO0yRjoWZCZl8YGnZ-2FUtT39hrC7FANwsVdFwih-2FjPAXRxXGX34KRXZbBdXxOOAU7lJYW8pbmw95O7UTCtXb0ZgUhHFEGOGSGAyaaIO4ryGxJ7ZPeRRNFlmb2kno8DS-2F38-2F5TX0-2BTnlBt5pcsAcH56lj-2FVvAeb9GYtA4sx8wGHR7G8sFHI9wDyF5-2BeU9tjfezDB0FQ-3D-3D
--- SBBSecho 3.14-Linux
* Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)
|