Operational Defect Database

BugZero found this defect 38 days ago.

MongoDB | 2639771

Coverity analysis defect 140394: Overflowed integer argument

Last update date:

4/11/2024

Affected products:

MongoDB Server

Affected releases:

8.0.0-rc0

Fixed releases:

No fixed releases provided.

Description:

Info

Overflowed integer argument The argument will be too small or even negative, likely resulting in unexpected behavior (for example, under-allocation in a memory allocation function). An integer overflow occurs, with the overflowed value used as an argument to a function /src/mongo/util/net/sock.cpp:424: INTEGER_OVERFLOW 140394 Called function "this->_send(data, len, context)", and a possible return value may be less than zero. /src/mongo/util/net/sock.cpp:424: INTEGER_OVERFLOW 140394 Assigning: "ret" = "this->_send(data, len, context)". /src/mongo/util/net/sock.cpp:435: INTEGER_OVERFLOW 140394 The expression "len" is considered to have possibly overflowed.

Top User Comments


Steps to Reproduce


Additional Resources / Links

Share:

BugZero® Risk Score

What's this?

Coming soon

Status

Needs Scheduling

Learn More

Search:

...