-
Notifications
You must be signed in to change notification settings - Fork 766
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
src/haproxy.c: unintentional integer overflow suspected by coverity #1585
Comments
This one is a false positive as the total SSL cache cannot be wider than 2 (or 4?) GB anyway. We could change this to 200ULL though. |
…rflow In issue #1585 Coverity suspects a risk of multiply overflow when calculating the SSL cache size, though in practice the cache is limited to 2^32 anyway thus it cannot really happen. Nevertheless, casting the operation should be sufficient to avoid marking it as a false positive.
hmm, coverity picked old source (or we passed old source to it). let us wait one more day |
oops, it is another occurence. @wtarreau , can you please apply similar cleanup around line 2383 ?
|
Ah, crap, and Iooked without noticing another one! I'll do it as well, thank you Ilya! |
Now done, coverity should be happy now. There were in fact two other places. |
it was the only remaining issue. 1st June will start as "0 issues remaining". I' closing this issue (will reopen tomorrow if coverity is still not happy) |
Tool Name and Version
coverity
Code Report
Additional Information
No response
Output of
haproxy -vv
The text was updated successfully, but these errors were encountered: