Bug #89192 | SQLExecute crash the process memory access violation | ||
---|---|---|---|
Submitted: | 11 Jan 2018 15:44 | Modified: | 15 Jan 2018 18:49 |
Reporter: | BaiYang Bai | Email Updates: | |
Status: | Unsupported | Impact on me: | |
Category: | Connector / ODBC | Severity: | S2 (Serious) |
Version: | 5.3.9 | OS: | Windows (Win7 32bit) |
Assigned to: | CPU Architecture: | Any |
[11 Jan 2018 15:44]
BaiYang Bai
[11 Jan 2018 15:47]
BaiYang Bai
Here are some info belong to the crash (may be not so useful): [2018-01-11 21:37:05.487335 UTC+0800][Fatal] (util.errhnd) unrecoverable underlaying error ocurred: The thread tried to read from or write to a virtual address for which it does not have the appropriate access {r(0)/w(1); acc. addr} (exp. number: 0xC0000005). pid = 17132 tid = 17084 exp. code addr = 0x5069BFAB parameters = 0x0; 0x6952 [2018-01-11 21:37:05.733349 UTC+0800][Fatal] (util.errhnd) call stack backtrace 5069BFAB (myodbc5w): (filename not available): SQLGetCursorNameW 50684B49 (myodbc5w): (filename not available): SQLGetCursorNameW 50684930 (myodbc5w): (filename not available): SQLGetCursorNameW 50683DCF (myodbc5w): (filename not available): SQLGetCursorNameW 64DA9716 (ODBC32): (filename not available): SQLDriverConnect 64DA95A7 (ODBC32): (filename not available): SQLDriverConnect 0066A365 (myapp): (filename not available): (function-name not available) 0066C4DC (myapp): (filename not available): (function-name not available) 778D5642 (ntdll): (filename not available): alldiv 752E0EF0 (KERNELBASE): (filename not available): ReleaseSemaphore 7789E394 (ntdll): (filename not available): RtlInitUnicodeString 7789E394 (ntdll): (filename not available): RtlInitUnicodeString 7789E0E2 (ntdll): (filename not available): RtlAllocateHeap 752E14DE (KERNELBASE): (filename not available): WaitForSingleObjectEx 66D94D83 (MSVCR80): (filename not available): malloc 66D94D83 (MSVCR80): (filename not available): malloc 66DC0E30 (MSVCR80): (filename not available): operator new @ tid = 17084
[11 Jan 2018 19:37]
MySQL Verification Team
Thank you for the bug report. We only process bugs run against MySQL binaries, so if you are able to test against a MySQL server and provide a repeatable test code attach it here for our test.
[15 Jan 2018 18:47]
BaiYang Bai
Yeah, I know. But I think if a program can be crashed (SEGFAULT) by just send some bytes to it through network, then it definitely contains some flaws (No matter who sent bytes to it).
[15 Jan 2018 18:49]
BaiYang Bai
You can return an error if you don't support that, but you can't just trigger a SETFUALT, right?