Coverity analysis defect 168150: Out-of-bounds read

XMLWordPrintableJSON

    • Type: Bug
    • Resolution: Won't Fix
    • Priority: Major - P3
    • None
    • Affects Version/s: None
    • Component/s: None
    • Query Execution
    • ALL
    • None
    • 3
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Out-of-bounds read

      Incorrect values read from a different memory region will cause incorrect computations. Out-of-bounds read from a buffer
      /data/bazel_cache/1de52aaeb35278243ca29a4785ce7969/execroot/_main_/src/mongo/db/exec/expression/evaluate_math.cpp:974: OVERRUN 168150 Checking "inputType >= 0" implies that "inputType" is at least 0 on the true branch.
      /data/bazel_cache/1de52aaeb35278243ca29a4785ce7969/execroot/_main_/src/mongo/db/exec/expression/evaluate_math.cpp:974: OVERRUN 168150 Checking "inputType <= mongo::JSTypeMax" implies that "inputType" is at least 20 on the false branch.
      /data/bazel_cache/1de52aaeb35278243ca29a4785ce7969/execroot/_main_/src/mongo/db/exec/expression/evaluate_math.cpp:975: OVERRUN 168150 Checking "targetType >= 0" implies that "targetType" is at least 0 on the true branch.
      /data/bazel_cache/1de52aaeb35278243ca29a4785ce7969/execroot/_main_/src/mongo/db/exec/expression/evaluate_math.cpp:975: OVERRUN 168150 Checking "targetType <= mongo::JSTypeMax" implies that "targetType" is between 0 and 19 (inclusive) on the true branch.

              Assignee:
              Projjal Chanda
              Reporter:
              Coverity Collector User
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: