-
Notifications
You must be signed in to change notification settings - Fork 5.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Malicious SQL statement which directly crashes TiDB server by triggering stack overflow #36896
Labels
Comments
I can reproduce:
|
Stack overflow from the memory OOM tracker, PTAL @XuHuaiyu
|
12 tasks
This was referenced May 12, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Bug Report
Please answer these questions before submitting your issue. Thanks!
1. Minimal reproduce step (Required)
Setup the environment and create database testdb
Testcase
mysql_bk.sql: mysql_bk.txt
min_stmts.sql: min_stmts.txt
Note: This bug can only be occasionally triggered, so you should repeat the test case several times to trigger the bug. Generally, I can reproduce the bug within10 tries.
2. What did you expect to see? (Required)
Testcase does not crash the TiDB server.
3. What did you see instead (Required)
Testcase crashed the TiDB server. The log shows that it may trigger a stack overflow bug.
The log of the TiDB server: tidb.log
4. What is your TiDB version? (Required)
The text was updated successfully, but these errors were encountered: