Skip to content

Fix possible action data loss in segmentation due to signed int32 overflow #21451

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Oct 31, 2023

Conversation

MichaelRoosz
Copy link
Contributor

When idaction exceeds signed int32 max (2147483647) - the temp table in "createTempTableForStoringUsedActions()" cannot store the idactions anymore and thus still used log_action rows will get deleted.

Copy link
Member

@sgiehl sgiehl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Makes sense to me. Looking at the other tables idaction seems to be INTEGER(10) UNSIGNED NOT NULL there as well.

@tsteur Can you see any downsides/problem in that changes

@sgiehl sgiehl added the Bug For errors / faults / flaws / inconsistencies etc. label Oct 30, 2023
@tsteur
Copy link
Member

tsteur commented Oct 30, 2023

Makes sense, I can't think of any downside 👍

@sgiehl sgiehl added this to the 5.0.0 milestone Oct 31, 2023
@sgiehl sgiehl changed the title Fix log_action data loss due to signed int32 overflow Fix possible action data loss in segmentation due to signed int32 overflow Oct 31, 2023
@sgiehl sgiehl merged commit b59bacc into matomo-org:5.x-dev Oct 31, 2023
@sgiehl
Copy link
Member

sgiehl commented Oct 31, 2023

Thanks for your contribution @MichaelRoosz 🎉

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Bug For errors / faults / flaws / inconsistencies etc.
Development

Successfully merging this pull request may close these issues.

3 participants