From: | Jianghua Yang <yjhjstz(at)gmail(dot)com> |
---|---|
To: | pgsql-hackers(at)lists(dot)postgresql(dot)org |
Subject: | [PATCH] Fix potential overflow in binary search mid calculation |
Date: | 2025-03-31 20:28:13 |
Message-ID: | CAAZLFmSOBEZtOPnZtfdeeDYnaM8-Ozz_Q1-vzrorzvdDmEEBww@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
Dear PostgreSQL Developers,
I have identified a potential integer overflow issue in the binary search
implementation within the DSA size class lookup code.
Issue Description
In the current implementation, the calculation of mid is performed as:
uint16 mid = (max + min) / 2;
Since both max and min are of type uint16, adding them together may exceed
65535, leading to an overflow and incorrect behavior in the binary search
logic. This could result in incorrect indexing into the dsa_size_classes
array.
Proposed Fix
To prevent this overflow, we should use the alternative calculation method:
uint16 mid = min + (max - min) / 2;
This approach ensures that (max - min) does not exceed 65535, preventing
the addition from overflowing while still correctly computing the middle
index.
Patch
A patch implementing this fix is attached.
Attachment | Content-Type | Size |
---|---|---|
0001-Fix-potential-overflow-in-binary-search-mid-calculat.patch | application/octet-stream | 821 bytes |
From | Date | Subject | |
---|---|---|---|
Next Message | Seth Robertson | 2025-03-31 20:29:39 | Re: [PATCH] Automatic client certificate selection support for libpq v1 |
Previous Message | David Rowley | 2025-03-31 20:11:13 | Re: pgsql: Add memory/disk usage for Window aggregate nodes in EXPLAIN. |