1. 21 Jun, 2007 1 commit
  2. 19 Jun, 2007 2 commits
  3. 18 Jun, 2007 3 commits
  4. 15 Jun, 2007 1 commit
  5. 14 Jun, 2007 1 commit
  6. 13 Jun, 2007 1 commit
  7. 12 Jun, 2007 1 commit
    • unknown's avatar
      Bug#28984: crasher on connect with out of range password length in \ · 73545200
      unknown authored
      	protocol
      
      Fixed duplicated code, same as last commit.
      
      One could send a malformed packet that caused the server to SEGV.  In 
      recent versions of the password protocol, the client tells the server 
      what length the ciphertext is (almost always 20).  If that length was
      large enough to overflow a signed char, then the number would jump to 
      very large after being casted to unsigned int.
      
      Instead, cast the *passwd char to uchar.
      
      
      sql/sql_parse.cc:
        Additional location of signed-char casted to uint.
      73545200
  8. 11 Jun, 2007 2 commits
  9. 08 Jun, 2007 2 commits
    • unknown's avatar
      Merge bk-internal.mysql.com:/home/bk/mysql-4.1-maint · afe63135
      unknown authored
      into  zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-4.1-maint
      
      afe63135
    • unknown's avatar
      Bug #28984: crasher on connect with out of range password length in \ · d0c9d6cb
      unknown authored
      	protocol
      
      One could send a malformed packet that caused the server to SEGV.  In 
      recent versions of the password protocol, the client tells the server 
      what length the ciphertext is (almost always 20).  If that length was
      large enough to overflow a signed char, then the number would jump to 
      very large after being casted to unsigned int.
      
      Instead, cast the *passwd char to uchar. 
      
      
      
      sql/sql_parse.cc:
        Cast *passwd to get rid of the sign, so that sign extension doesn't
        cause the sequence 125, 126, 127, 4294967169, 4294967170.
      d0c9d6cb
  10. 07 Jun, 2007 3 commits
    • unknown's avatar
      Merge trift2.:/MySQL/M41/bug23504-4.1 · eabbf72f
      unknown authored
      into  trift2.:/MySQL/M41/push-4.1
      
      eabbf72f
    • unknown's avatar
      netware/*.def : Allocate 128K stack for all executables (bug#23504) · 71516c02
      unknown authored
      
      netware/comp_err.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/isamchk.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/isamlog.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/libmysql.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/my_print_defaults.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/myisam_ftdump.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/myisamchk.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/myisamlog.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/myisampack.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysql.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysql_install_db.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysql_test_run.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysql_waitpid.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqladmin.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqlbinlog.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqlcheck.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqld.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqld_safe.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqldump.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqlimport.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqlshow.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqltest.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/pack_isam.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/perror.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/replace.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/resolve_stack_dump.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/resolveip.def:
        Allocate 128K stack for all executables (bug#23504)
      71516c02
    • unknown's avatar
      Merge pilot.(none):/data/msvensson/mysql/bug10218/my41-bug10218 · 0c9babb0
      unknown authored
      into  pilot.(none):/data/msvensson/mysql/mysql-4.1-maint
      
      0c9babb0
  11. 06 Jun, 2007 6 commits
  12. 04 Jun, 2007 2 commits
  13. 01 Jun, 2007 4 commits
    • unknown's avatar
      Move code after variable delcaration · 1a72e8c7
      unknown authored
      1a72e8c7
    • unknown's avatar
      Merge pilot.(none):/data/msvensson/mysql/bug28497/my41-bug28497-query_get_value · 6267e9e7
      unknown authored
      into  pilot.(none):/data/msvensson/mysql/mysql-4.1-maint
      
      6267e9e7
    • unknown's avatar
      Bug#28497 wait_for_slave_to_stop can cause random replication mysql-test failures · 9aa92f2b
      unknown authored
       - Add funtion "query_get_value to allow reading a fields value
         into a $variable
      
      
      client/mysqltest.c:
        - Add function "let $var= query_get_value(<query>,<colname>,<row>)"
          making it possible to read a value from a specific field in a query 
          into a $variable.
      mysql-test/r/mysqltest.result:
        Add test cases for "query_get_value"
      mysql-test/t/mysqltest.test:
        Add test cases for "query_get_value"
      9aa92f2b
    • unknown's avatar
      BUG#28574 - repair table causes queries to fail with various · 6529fbe6
      unknown authored
                  corruption errors: 126,134,145
      
      When one thread attempts to lock two (or more) tables and another
      thread executes statement that aborts these locks (e.g. REPAIR
      TABLE) we may get a table object with wrong lock type in a table
      cache.
      
      For example if SELECT FROM t1,t2 was aborted, subsequent INSERT
      INTO t1 may be executed under read lock.
      
      As a result we may get various table corruptions and even a server
      crash.
      
      This is fixed by resetting lock type in case lock was aborted by
      another thread.
      
      I failed to create reasonable test case for this bug.
      
      
      sql/lock.cc:
        If thr_multi_lock was aborted by another thread, it unlocks tables
        that were locked before one that was aborted. Lock type for tables
        that were after a table that was aborted preserved. Thus we need
        to reset lock data in case thr_multi_lock was aborted.
      6529fbe6
  14. 30 May, 2007 2 commits
  15. 23 May, 2007 3 commits
  16. 22 May, 2007 1 commit
  17. 21 May, 2007 2 commits
  18. 18 May, 2007 3 commits