diff options
author | unknown <cmiller@zippy.cornsilk.net> | 2007-06-11 16:03:05 -0400 |
---|---|---|
committer | unknown <cmiller@zippy.cornsilk.net> | 2007-06-11 16:03:05 -0400 |
commit | 46085513c186e84a0acb852a3dea0c603cd3ffdf (patch) | |
tree | 79d7a9c84509adf43489f4f00f013878bf8dd574 /mysql-test/t | |
parent | 67b33c810ab59cf2807acdf1756b1d738c79adbb (diff) | |
download | mariadb-git-46085513c186e84a0acb852a3dea0c603cd3ffdf.tar.gz |
Bug#28984: crasher on connect with out of range password length in \
protocol
Update for function moved to new file in 5.1.
One could send a malformed packet that caused the server to SEGV. In
recent versions of the password protocol, the client tells the server
what length the ciphertext is (almost always 20). If that length was
large enough to overflow a signed char, then the number would jump to
very large after being casted to unsigned int.
Instead, cast the *passwd char to uchar.
sql/sql_connect.cc:
Update for function moved to new file in 5.1.
Diffstat (limited to 'mysql-test/t')
0 files changed, 0 insertions, 0 deletions