From 2a344764886e59716126cfae432dc3d3c7d435d8 Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Fri, 13 Apr 2012 19:08:05 +0200 Subject: MySQL 5.5.23 --- mysql-string-overflow.patch | 17 +---------------- 1 file changed, 1 insertion(+), 16 deletions(-) (limited to 'mysql-string-overflow.patch') diff --git a/mysql-string-overflow.patch b/mysql-string-overflow.patch index f86d3b9..54f6d40 100644 --- a/mysql-string-overflow.patch +++ b/mysql-string-overflow.patch @@ -37,19 +37,4 @@ diff -up mysql-5.5.21/sql/sql_trigger.cc.coverity mysql-5.5.21/sql/sql_trigger.c } -Error: STRING_OVERFLOW: -/builddir/build/BUILD/mysql-5.1.61/storage/innodb_plugin/handler/ha_innodb.cc:6544: fixed_size_dest: You might overrun the 512 byte fixed-size string "name2" by copying "name" without checking the length. -/builddir/build/BUILD/mysql-5.1.61/storage/innodb_plugin/handler/ha_innodb.cc:6544: parameter_as_source: Note: This defect has an elevated risk because the source argument is a parameter of the current function. - -diff -up mysql-5.5.21/storage/innobase/handler/ha_innodb.cc.coverity mysql-5.5.21/storage/innobase/handler/ha_innodb.cc ---- mysql-5.5.21/storage/innobase/handler/ha_innodb.cc.coverity 2012-03-13 17:28:52.982738150 +0100 -+++ mysql-5.5.21/storage/innobase/handler/ha_innodb.cc 2012-03-13 17:29:14.952427553 +0100 -@@ -6926,7 +6926,7 @@ ha_innobase::create( - DBUG_RETURN(HA_ERR_TO_BIG_ROW); - } - -- strcpy(name2, name); -+ strncpy(name2, name, sizeof(name2)-1); - - normalize_table_name(norm_name, name2); - + -- cgit