mirror of
https://github.com/MariaDB/server.git
synced 2026-01-25 04:41:47 +01:00
When a client connects with CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA capability and a password >= 251 bytes, the server incorrectly calculates the database name pointer. For passwords >= 251 bytes, LENENC uses a 3-byte prefix (0xFC + 2 bytes), but the old code assumed a 1-byte prefix. Fix by using the passwd pointer which has already been advanced past the length prefix by safe_net_field_length_ll(). Also fix db pointer calculation for old protocol (!CLIENT_SECURE_CONNECTION) where the password is null-terminated and needs +1 to skip the terminator. |
||
|---|---|---|
| .. | ||
| audit_null.test | ||
| audit_null_debug.test | ||
| auth_ed25519.test | ||
| auth_v0100.test | ||
| binlog-simple_plugin_check.test | ||
| cracklib_password_check.test | ||
| dialog.test | ||
| false_dupes-6543.test | ||
| feedback_plugin_install.opt | ||
| feedback_plugin_install.test | ||
| feedback_plugin_load.opt | ||
| feedback_plugin_load.test | ||
| feedback_plugin_send.test | ||
| fulltext_notembedded.test | ||
| fulltext_plugin.test | ||
| locales.opt | ||
| locales.test | ||
| max_password_errors_auth_named_pipe.opt | ||
| max_password_errors_auth_named_pipe.test | ||
| max_password_errors_auth_socket.opt | ||
| max_password_errors_auth_socket.test | ||
| mdev38431.test | ||
| multiauth.test | ||
| pam.test | ||
| pam_cleartext.opt | ||
| pam_cleartext.test | ||
| pam_init.inc | ||
| pam_v1.test | ||
| processlist.test | ||
| qc_info.test | ||
| qc_info_init.inc | ||
| qc_info_init.opt | ||
| qc_info_priv.test | ||
| server_audit.opt | ||
| server_audit.test | ||
| server_audit_pwd_mask.test | ||
| show_all_plugins.test | ||
| simple_password_check.test | ||
| sql_error_log.test | ||
| sql_error_log_withdbinfo.opt | ||
| sql_error_log_withdbinfo.test | ||
| test_sql_service.opt | ||
| test_sql_service.test | ||
| thread_pool_server_audit.opt | ||
| thread_pool_server_audit.test | ||
| two_password_validations.test | ||
| unix_socket.test | ||