You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@avro.apache.org by "Kalle Niemitalo (Jira)" <ji...@apache.org> on 2022/08/24 07:43:00 UTC
[jira] [Created] (AVRO-3617) [C++] Integer overflow risks with Validator::count_ and Validator::counters_
Kalle Niemitalo created AVRO-3617:
-------------------------------------
Summary: [C++] Integer overflow risks with Validator::count_ and Validator::counters_
Key: AVRO-3617
URL: https://issues.apache.org/jira/browse/AVRO-3617
Project: Apache Avro
Issue Type: Bug
Components: c++
Reporter: Kalle Niemitalo
In Validator, there seems to be some inconsistency with {{std::vector<size_t> counters_}} and {{int64_t count_}}:
- Validator::countingSetup converts int64_t to size_t: {{counters_.push_back(static_cast<size_t>(count_));}}
- Validator::countingAdvance converts size_t to int: {{int count = --counters_.back();}}
- Validator::unionAdvance converts size_t to int64_t: {{if (count_ < static_cast<int64_t>(node->leaves()))}}
- Validator::unionAdvance converts int64_t to int and that to size_t: {{setupOperation(node->leafAt(static_cast<int>(count_)));}}
I did not verify whether these integers can actually grow so high that overflow is possible. Nevertheless, it would be safest to use integer types consistently.
(Originally posted as [https://github.com/apache/avro/pull/1836#issuecomment-1225303643].)
--
This message was sent by Atlassian Jira
(v8.20.10#820010)