1. 21 Jun, 2007 1 commit
  2. 19 Jun, 2007 2 commits
  3. 18 Jun, 2007 3 commits
  4. 15 Jun, 2007 1 commit
  5. 14 Jun, 2007 1 commit
  6. 13 Jun, 2007 1 commit
  7. 12 Jun, 2007 1 commit
    • unknown's avatar
      Bug#28984: crasher on connect with out of range password length in \ · 3a364d51
      unknown authored
      	protocol
      
      Fixed duplicated code, same as last commit.
      
      One could send a malformed packet that caused the server to SEGV.  In 
      recent versions of the password protocol, the client tells the server 
      what length the ciphertext is (almost always 20).  If that length was
      large enough to overflow a signed char, then the number would jump to 
      very large after being casted to unsigned int.
      
      Instead, cast the *passwd char to uchar.
      
      
      sql/sql_parse.cc:
        Additional location of signed-char casted to uint.
      3a364d51
  8. 11 Jun, 2007 2 commits
  9. 08 Jun, 2007 2 commits
    • unknown's avatar
      Merge bk-internal.mysql.com:/home/bk/mysql-4.1-maint · 606927f7
      unknown authored
      into  zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-4.1-maint
      
      
      606927f7
    • unknown's avatar
      Bug #28984: crasher on connect with out of range password length in \ · c1585aea
      unknown authored
      	protocol
      
      One could send a malformed packet that caused the server to SEGV.  In 
      recent versions of the password protocol, the client tells the server 
      what length the ciphertext is (almost always 20).  If that length was
      large enough to overflow a signed char, then the number would jump to 
      very large after being casted to unsigned int.
      
      Instead, cast the *passwd char to uchar. 
      
      
      
      sql/sql_parse.cc:
        Cast *passwd to get rid of the sign, so that sign extension doesn't
        cause the sequence 125, 126, 127, 4294967169, 4294967170.
      c1585aea
  10. 07 Jun, 2007 3 commits
    • unknown's avatar
      Merge trift2.:/MySQL/M41/bug23504-4.1 · 35a948f7
      unknown authored
      into  trift2.:/MySQL/M41/push-4.1
      
      
      35a948f7
    • unknown's avatar
      netware/*.def : Allocate 128K stack for all executables (bug#23504) · bc671e2f
      unknown authored
      
      netware/comp_err.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/isamchk.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/isamlog.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/libmysql.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/my_print_defaults.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/myisam_ftdump.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/myisamchk.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/myisamlog.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/myisampack.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysql.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysql_install_db.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysql_test_run.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysql_waitpid.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqladmin.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqlbinlog.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqlcheck.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqld.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqld_safe.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqldump.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqlimport.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqlshow.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/mysqltest.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/pack_isam.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/perror.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/replace.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/resolve_stack_dump.def:
        Allocate 128K stack for all executables (bug#23504)
      netware/resolveip.def:
        Allocate 128K stack for all executables (bug#23504)
      bc671e2f
    • unknown's avatar
      Merge pilot.(none):/data/msvensson/mysql/bug10218/my41-bug10218 · fe8fdfcc
      unknown authored
      into  pilot.(none):/data/msvensson/mysql/mysql-4.1-maint
      
      
      fe8fdfcc
  11. 06 Jun, 2007 6 commits
  12. 04 Jun, 2007 2 commits
  13. 01 Jun, 2007 4 commits
    • unknown's avatar
      Move code after variable delcaration · e5822c2c
      unknown authored
      e5822c2c
    • unknown's avatar
      Merge pilot.(none):/data/msvensson/mysql/bug28497/my41-bug28497-query_get_value · 9f1998b1
      unknown authored
      into  pilot.(none):/data/msvensson/mysql/mysql-4.1-maint
      
      
      9f1998b1
    • unknown's avatar
      Bug#28497 wait_for_slave_to_stop can cause random replication mysql-test failures · 5b0e66a7
      unknown authored
       - Add funtion "query_get_value to allow reading a fields value
         into a $variable
      
      
      client/mysqltest.c:
        - Add function "let $var= query_get_value(<query>,<colname>,<row>)"
          making it possible to read a value from a specific field in a query 
          into a $variable.
      mysql-test/r/mysqltest.result:
        Add test cases for "query_get_value"
      mysql-test/t/mysqltest.test:
        Add test cases for "query_get_value"
      5b0e66a7
    • unknown's avatar
      BUG#28574 - repair table causes queries to fail with various · 93b10124
      unknown authored
                  corruption errors: 126,134,145
      
      When one thread attempts to lock two (or more) tables and another
      thread executes statement that aborts these locks (e.g. REPAIR
      TABLE) we may get a table object with wrong lock type in a table
      cache.
      
      For example if SELECT FROM t1,t2 was aborted, subsequent INSERT
      INTO t1 may be executed under read lock.
      
      As a result we may get various table corruptions and even a server
      crash.
      
      This is fixed by resetting lock type in case lock was aborted by
      another thread.
      
      I failed to create reasonable test case for this bug.
      
      
      sql/lock.cc:
        If thr_multi_lock was aborted by another thread, it unlocks tables
        that were locked before one that was aborted. Lock type for tables
        that were after a table that was aborted preserved. Thus we need
        to reset lock data in case thr_multi_lock was aborted.
      93b10124
  14. 30 May, 2007 2 commits
  15. 23 May, 2007 3 commits
  16. 22 May, 2007 1 commit
  17. 21 May, 2007 2 commits
  18. 18 May, 2007 3 commits