[ https://issues.apache.org/jira/browse/AVRO-3617?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Martin Tzvetanov Grigorov updated AVRO-3617: -------------------------------------------- Fix Version/s: 1.12.0 Assignee: (was: Christophe Le Saec) Resolution: Fixed Status: Resolved (was: Patch Available) > [C++] Integer overflow risks with Validator::count_ and Validator::counters_ > ---------------------------------------------------------------------------- > > Key: AVRO-3617 > URL: https://issues.apache.org/jira/browse/AVRO-3617 > Project: Apache Avro > Issue Type: Bug > Components: c++ > Reporter: Kalle Niemitalo > Priority: Minor > Labels: pull-request-available, pull-requests-available > Fix For: 1.12.0 > > Time Spent: 2.5h > Remaining Estimate: 0h > > In Validator, there seems to be some inconsistency with {{std::vector<size_t> > counters_}} and {{int64_t count_}}: > - Validator::countingSetup converts int64_t to size_t: > {{counters_.push_back(static_cast<size_t>(count_));}} > - Validator::countingAdvance converts size_t to int: {{int count = > --counters_.back();}} > - Validator::unionAdvance converts size_t to int64_t: {{if (count_ < > static_cast<int64_t>(node->leaves()))}} > - Validator::unionAdvance converts int64_t to int and that to size_t: > {{setupOperation(node->leafAt(static_cast<int>(count_)));}} > I did not verify whether these integers can actually grow so high that > overflow is possible. Nevertheless, it would be safest to use integer types > consistently. > (Originally posted as > [https://github.com/apache/avro/pull/1836#issuecomment-1225303643].) -- This message was sent by Atlassian Jira (v8.20.10#820010)