Skip to content

fix(security): 2 improvements across 2 files#1492

Open
tomaioo wants to merge 2 commits into
apache:masterfrom
tomaioo:fix/security/integer-overflow-in-negative-ack-backoff
Open

fix(security): 2 improvements across 2 files#1492
tomaioo wants to merge 2 commits into
apache:masterfrom
tomaioo:fix/security/integer-overflow-in-negative-ack-backoff

Conversation

@tomaioo
Copy link
Copy Markdown

@tomaioo tomaioo commented May 10, 2026

Summary

fix(security): 2 improvements across 2 files

Problem

Severity: High | File: pulsar/negative_backoff_policy.go:L30

In pulsar/negative_backoff_policy.go, the backoff calculation uses bit shift (minNackTime << redeliveryCount) which can overflow when redeliveryCount is large. The overflow causes backoff to become 0, resulting in immediate retry without any delay, potentially causing a denial of service.

Solution

Add overflow check before the shift operation: if redeliveryCount >= 63 { return maxNackTime }. Also consider using math.Min with a pre-computed maximum to avoid the overflow entirely.

Changes

  • pulsar/negative_backoff_policy.go (modified)
  • oauth2/oidc_endpoint_provider.go (modified)

tomaioo added 2 commits May 10, 2026 11:22
- Security: Integer Overflow in Negative Ack Backoff Policy
- Security: Potential SSRF via Issuer URL in OIDC Endpoint Provider

Signed-off-by: tomaioo <203048277+tomaioo@users.noreply.github.com>
- Security: Integer Overflow in Negative Ack Backoff Policy
- Security: Potential SSRF via Issuer URL in OIDC Endpoint Provider

Signed-off-by: tomaioo <203048277+tomaioo@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant