Uploaded image for project: 'Core Server'
  1. Core Server
  2. SERVER-89321

Coverity analysis defect 140394: Overflowed integer argument

    • Type: Icon: Bug Bug
    • Resolution: Fixed
    • Priority: Icon: Major - P3 Major - P3
    • 8.1.0-rc0
    • Affects Version/s: 8.0.0-rc0
    • Component/s: None
    • Labels:
    • Service Arch
    • Fully Compatible
    • ALL
    • v8.0
    • Service Arch 2024-04-29, Service Arch 2024-05-13

      Overflowed integer argument

      The argument will be too small or even negative, likely resulting in unexpected behavior (for example, under-allocation in a memory allocation function). An integer overflow occurs, with the overflowed value used as an argument to a function
      /src/mongo/util/net/sock.cpp:424: INTEGER_OVERFLOW 140394 Called function "this->_send(data, len, context)", and a possible return value may be less than zero.
      /src/mongo/util/net/sock.cpp:424: INTEGER_OVERFLOW 140394 Assigning: "ret" = "this->_send(data, len, context)".
      /src/mongo/util/net/sock.cpp:435: INTEGER_OVERFLOW 140394 The expression "len" is considered to have possibly overflowed.

            Assignee:
            ronald.steinke@mongodb.com Ronald Steinke
            Reporter:
            xgen-internal-coverity Coverity Collector User
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: