From: | Tender Wang <tndrwang(at)gmail(dot)com> |
---|---|
To: | Jianghua Yang <yjhjstz(at)gmail(dot)com> |
Cc: | pgsql-hackers(at)lists(dot)postgresql(dot)org |
Subject: | Re: [PATCH] Fix potential overflow in binary search mid calculation |
Date: | 2025-04-01 01:42:11 |
Message-ID: | CAHewXNmELCjLrCZoRmkh9R5-m4OpewZhDQB9NXo-kkN-2o=Ovw@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
Jianghua Yang <yjhjstz(at)gmail(dot)com> 于2025年4月1日周二 04:29写道:
> Dear PostgreSQL Developers,
>
> I have identified a potential integer overflow issue in the binary search
> implementation within the DSA size class lookup code.
> Issue Description
>
> In the current implementation, the calculation of mid is performed as:
>
> uint16 mid = (max + min) / 2;
>
> Since both max and min are of type uint16, adding them together may exceed
> 65535, leading to an overflow and incorrect behavior in the binary
> search logic. This could result in incorrect indexing into the
> dsa_size_classes array.
>
The value of min is from the array dsa_size_class_map. The max value in
dsa_size_class_map[] is 25.
The value of max is the length of dsa_size_classes[], which is not too
large.
It will not happen that (max + min) exceeds 65535.
> Proposed Fix
>
> To prevent this overflow, we should use the alternative calculation method:
>
> uint16 mid = min + (max - min) / 2;
>
> This approach ensures that (max - min) does not exceed 65535, preventing
> the addition from overflowing while still correctly computing the middle
> index.
> Patch
>
> A patch implementing this fix is attached.
>
--
Thanks, Tender Wang
From | Date | Subject | |
---|---|---|---|
Next Message | torikoshia | 2025-04-01 01:43:10 | Re: RFC: Logging plan of the running query |
Previous Message | Hayato Kuroda (Fujitsu) | 2025-04-01 01:22:49 | RE: Fix 035_standby_logical_decoding.pl race conditions |