Hi Steve,

Yes, all my references are from long-long ago. However I have reported
the problem (correctly) against latest at the time of bug report repo
version 0.82.

As patch is trivial and tds.h has not changed in 0.91, I am 99.9% sure
the problem is actual for that version as well.

On 11.09.2013 1:14, Steve Langasek wrote:
> This thread is from 2002, long before freetds 0.82 was released,
> and shows an upstream developer stating that the bug had been fixed
> back then.

The sources (0.82, 0.91) still state:

#define TDS_MAX_LOGIN_STR_SZ 30

> So why is this patch needed?  What protocol version are you using?

My /etc/freetds.conf says:

=== cut ===
[test]
        host = 10.1.2.14
        port = 1433
        tds version = 7.1
=== cut ===

Also I have compiled FreeTDS with following command line:

CPPFLAGS=-I$HOME/include ./configure --prefix=$HOME --with-iodbc=$HOME
--enable-krb5=gssapi_krb5 --with-tdsver=7.1

> Is this problem reproducible with freetds 0.91, which released with
> wheezy? It looks like the code has changed significantly, and there
> are no string limits at all in the password field now.

Please, follow TDS_MAX_LOGIN_STR_SZ constant in all sources and you
will see that the limit is still there.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to