Files
bun.sh/test/regression/issue
Claude Bot 46dd722761 Fix integer overflow in MySQL client when processing malformed packets
When the MySQL client receives a packet with the maximum possible length
(0xFFFFFF), adding PacketHeader.size (4 bytes) causes an integer overflow.
This was causing a panic with "integer overflow" when fuzzing the MySQL
client with malformed packets.

The fix adds a check before buffer allocation to ensure the packet length
is within safe bounds. If a packet exceeds the maximum safe size
(0xFFFFFF - 4), the connection is forcefully closed with an InvalidEncodedLength
error instead of panicking.

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-09-10 23:11:08 +00:00
..
2025-08-06 06:44:46 -07:00
2025-01-28 17:23:57 -08:00
2025-06-03 13:23:12 -07:00
2025-06-03 23:41:37 -07:00
2025-01-17 22:08:07 -08:00
2024-06-14 01:50:36 -07:00
2024-09-24 22:46:18 -07:00
2025-03-03 21:38:05 -08:00
2025-05-26 21:18:22 -07:00
2025-07-03 01:06:22 -07:00
2025-07-23 22:31:42 -07:00
2025-07-20 23:02:10 -07:00