[PATCH] Fix potential overflow in binary search mid calculation

From: Jianghua Yang <yjhjstz(at)gmail(dot)com>
To: pgsql-hackers(at)lists(dot)postgresql(dot)org
Subject: [PATCH] Fix potential overflow in binary search mid calculation
Date: 2025-03-31 20:28:13
Message-ID: CAAZLFmSOBEZtOPnZtfdeeDYnaM8-Ozz_Q1-vzrorzvdDmEEBww@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Dear PostgreSQL Developers,

I have identified a potential integer overflow issue in the binary search
implementation within the DSA size class lookup code.
Issue Description

In the current implementation, the calculation of mid is performed as:

uint16 mid = (max + min) / 2;

Since both max and min are of type uint16, adding them together may exceed
65535, leading to an overflow and incorrect behavior in the binary search
logic. This could result in incorrect indexing into the dsa_size_classes
array.
Proposed Fix

To prevent this overflow, we should use the alternative calculation method:

uint16 mid = min + (max - min) / 2;

This approach ensures that (max - min) does not exceed 65535, preventing
the addition from overflowing while still correctly computing the middle
index.
Patch

A patch implementing this fix is attached.

Attachment Content-Type Size
0001-Fix-potential-overflow-in-binary-search-mid-calculat.patch application/octet-stream 821 bytes

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Seth Robertson 2025-03-31 20:29:39 Re: [PATCH] Automatic client certificate selection support for libpq v1
Previous Message David Rowley 2025-03-31 20:11:13 Re: pgsql: Add memory/disk usage for Window aggregate nodes in EXPLAIN.