[SERVER-15743] Coverity analysis defect 31402: Integer overflowed argument Created: 20/Oct/14  Updated: 18/Dec/14  Resolved: 17/Dec/14

Status: Closed
Project: Core Server
Component/s: Testing Infrastructure
Affects Version/s: None
Fix Version/s: 2.8.0-rc3

Type: Bug Priority: Major - P3
Reporter: Coverity Collector User Assignee: Robert Guo (Inactive)
Resolution: Done Votes: 0
Labels: coverity
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified

Backwards Compatibility: Fully Compatible
Operating System: ALL
Participants:

 Description   

A new defect has been detected and assigned to andreas.nilsson@10gen.com in Coverity Connect.
http://coverity.mongodb.com//sourcebrowser.htm?projectId=10001#mergedDefectId=31402
The defect was flagged by checker INTEGER_OVERFLOW in
file /src/mongo/client/sasl_client_session.cpp
function mongo::SaslClientSession::setParameter(mongo::SaslClientSession::Parameter, const mongo::StringData &)
and this ticket was created by milkie



 Comments   
Comment by Githook User [ 10/Dec/14 ]

Author:

{u'username': u'guoyr', u'name': u'Robert Guo', u'email': u'robert.guo@10gen.com'}

Message: SERVER-15743 Fixed size_t overflow in SaslClientSession::setParameter

Closes #872

Signed-off-by: Benety Goh <benety@mongodb.com>
Branch: master
https://github.com/mongodb/mongo/commit/35077bc84d0b3b76578aae2c7173c9fe8c3be7ce

Generated at Thu Feb 08 03:38:50 UTC 2024 using Jira 9.7.1#970001-sha1:2222b88b221c4928ef0de3161136cc90c8356a66.