diff options
author | unknown <msvensson@neptunus.(none)> | 2006-08-30 17:11:00 +0200 |
---|---|---|
committer | unknown <msvensson@neptunus.(none)> | 2006-08-30 17:11:00 +0200 |
commit | d4075f6659caf5f0941dda36773c86a82468cec9 (patch) | |
tree | cb0a6aee5cef9906d853d84c796d83bd6242572f /tests/fork_big.pl | |
parent | 91bdf2952d0f78a514d03235754ee54813f9ae6c (diff) | |
download | mariadb-git-d4075f6659caf5f0941dda36773c86a82468cec9.tar.gz |
Bug#21813 An attacker has the opportunity to bypass query logging, part2
- Use the "%.*b" format when printing prepared and exeuted prepared statements to the log.
- Add test case to check that also prepared statements end up in the query log
Bug#14346 Prepared statements corrupting general log/server memory
- Use "stmt->query" when logging the newly prepared query instead of "packet"
sql/sql_prepare.cc:
mysql_stmt_prepare
- Use "%.*b" format when printing to log
- Print the query from stmt instead of "packet", packet points at the net in/out buffer and has most likely been overwritten
when result for prepare was written to client.
mysql_stmt_execute
- Use "%.*b" format when printing to log
- Print the query from thd as the expanded query has been specifially set to be valid also after restore from backup statement
tests/mysql_client_test.c:
Add tests for bug#21813 to already existing test for bug#17667. Add functionality for also executing prepared statements and making sure they end up in the log as well.
Diffstat (limited to 'tests/fork_big.pl')
0 files changed, 0 insertions, 0 deletions