question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Integer overflow in TCP comm

See original GitHub issue

What happened:

I am receiving integer overflow errors in some large scale computations. Haven’t had the chance to construct a MCVE but will try to.

cc @jakirkham I believe you reworked this section recently. Maybe you spot what’s going wrong right away

What you expected to happen:

Minimal Complete Verifiable Example:

N/A

Anything else we need to know?:

Traceback (most recent call last):
  File "/mnt/mesos/sandbox/venv/lib/python3.6/site-packages/distributed/core.py", line 554, in handle_stream
    msgs = await comm.read()
  File "/mnt/mesos/sandbox/venv/lib/python3.6/site-packages/distributed/comm/tcp.py", line 199, in read
    n = await stream.read_into(frames)
  File "/mnt/mesos/sandbox/venv/lib/python3.6/site-packages/tornado/iostream.py", line 475, in read_into
    self._try_inline_read()
  File "/mnt/mesos/sandbox/venv/lib/python3.6/site-packages/tornado/iostream.py", line 842, in _try_inline_read
    pos = self._read_to_buffer_loop()
  File "/mnt/mesos/sandbox/venv/lib/python3.6/site-packages/tornado/iostream.py", line 755, in _read_to_buffer_loop
    if self._read_to_buffer() == 0:
  File "/mnt/mesos/sandbox/venv/lib/python3.6/site-packages/tornado/iostream.py", line 867, in _read_to_buffer
    bytes_read = self.read_from_fd(buf)
  File "/mnt/mesos/sandbox/venv/lib/python3.6/site-packages/tornado/iostream.py", line 1592, in read_from_fd
    return self.socket.recv_into(buf, len(buf))
  File "/usr/lib/python3.6/ssl.py", line 1009, in recv_into
    return self.read(nbytes, buffer)
  File "/usr/lib/python3.6/ssl.py", line 871, in read
    return self._sslobj.read(len, buffer)
  File "/usr/lib/python3.6/ssl.py", line 631, in read
    v = self._sslobj.read(len, buffer)
OverflowError: signed integer is greater than maximum (distributed.core)

Environment:

Issue Analytics

  • State:closed
  • Created 3 years ago
  • Comments:27 (23 by maintainers)

github_iconTop GitHub Comments

1reaction
jrbourbeaucommented, Mar 18, 2021

Yeah, let’s close for now and re-open is needed

0reactions
jakirkhamcommented, Jul 30, 2021

We are cutting a release tomorrow. These fixes should be in there ( https://github.com/dask/community/issues/173 )

Read more comments on GitHub >

github_iconTop Results From Across the Web

Integer Overflow - an overview | ScienceDirect Topics
An integer overflow occurs when you attempt to store inside an integer variable a value that is larger than the maximum value the...
Read more >
MS.Windows.TCP.IP.Integer.Overflow - FortiGuard
The vulnerability is due to an error when the vulnerable software handles malformed TCP packets. The detection is based on a threshold of...
Read more >
Prevent integer underflow/overflow when receiving integer ...
Save this question. Show activity on this post. Say for instance I have a TCP server that needs to know the unsigned integer...
Read more >
Integer overflow: How does it occur and how can it be ...
An integer overflow or wraparound happens when an attempt is made to store a value that is too large for an integer type....
Read more >
Snort TCP Stream Reassembly Integer Overflow Vulnerability
It also detects several types of IDS evasion attacks. We have discovered an exploitable heap overflow in this module resulting from sequence number...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found