Operational Defect Database

BugZero found this defect 38 days ago.

MongoDB | 2639764

Coverity analysis defect 139793: Overflowed integer argument

Last update date:

4/11/2024

Affected products:

MongoDB Server

Affected releases:

8.0.0-rc0

Fixed releases:

No fixed releases provided.

Description:

Info

Overflowed integer argument The argument will be too small or even negative, likely resulting in unexpected behavior (for example, under-allocation in a memory allocation function). An integer overflow occurs, with the overflowed value used as an argument to a function /src/mongo/util/net/ssl_manager_openssl.cpp:3079: INTEGER_OVERFLOW 139793 The check "writePos /src/mongo/util/net/ssl_manager_openssl.cpp:3073: INTEGER_OVERFLOW 139793 The expression "fromBIO - writePos" is deemed overflowed because at least one of its arguments has overflowed. /src/mongo/util/net/ssl_manager_openssl.cpp:3073: INTEGER_OVERFLOW 139793 Assigning: "numWrite" = "fromBIO - writePos". /src/mongo/util/net/ssl_manager_openssl.cpp:3074: INTEGER_OVERFLOW 139793 "numWrite", which might have underflowed, is passed to "send(conn->socket->rawFD(), buffer + writePos, numWrite, mongo::portSendFlags)".

Top User Comments


Steps to Reproduce


Additional Resources / Links

Share:

BugZero® Risk Score

What's this?

Coming soon

Status

Needs Scheduling

Learn More

Search:

...