Uploaded image for project: 'Core Server'
  1. Core Server
  2. SERVER-89323

Coverity analysis defect 153466: Overflowed integer argument

    • Type: Icon: Bug Bug
    • Resolution: Fixed
    • Priority: Icon: Major - P3 Major - P3
    • 8.1.0-rc0
    • Affects Version/s: 8.0.0-rc0
    • Component/s: None
    • Labels:
    • Service Arch
    • Fully Compatible
    • ALL
    • v8.0
    • Service Arch 2024-05-13

      Overflowed integer argument

      The argument will be too small or even negative, likely resulting in unexpected behavior (for example, under-allocation in a memory allocation function). An integer overflow occurs, with the overflowed value used as an argument to a function
      /src/mongo/transport/asio/asio_tcp_fast_open.cpp:206: INTEGER_OVERFLOW 153466 The value returned in "k" is considered tainted.
      /src/mongo/transport/asio/asio_tcp_fast_open.cpp:207: INTEGER_OVERFLOW 153466 The cast of "k" to a signed type could result in a negative number.

            Assignee:
            ronald.steinke@mongodb.com Ronald Steinke
            Reporter:
            xgen-internal-coverity Coverity Collector User
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated:
              Resolved: