pgsql: Make ALTER DEFAULT PRIVILEGES require privileges, not membership

Поиск
Список
Период
Сортировка
От Robert Haas
Тема pgsql: Make ALTER DEFAULT PRIVILEGES require privileges, not membership
Дата
Msg-id E1oaLi2-001579-OX@gemulon.postgresql.org
обсуждение исходный текст
Список pgsql-committers
Make ALTER DEFAULT PRIVILEGES require privileges, not membership.

If role A is a direct or indirect member of role B but does not inherit
B's privileges (because at least one relevant grant was created WITH
INHERIT FALSE) then A should not be permitted to bypass privilege
checks that require the privileges of B. For example, A can't change
the privileges of objects owned by B, nor can A drop those objects.

However, up until now, it's been possible for A to change default
privileges for role B. That doesn't seem to be correct, because a
non-inherited role grant is only supposed to permit you to assume
the identity of the granted role via SET ROLE, and should not
otherwise permit you to exercise the privileges of that role. Most
places followed that rule, but this case was an exception.

This could be construed as a security vulnerability, but it does not
seem entirely clear cut, since older branches were fuzzy about the
distinction between is_member_of_role() and has_privs_of_role() in
a number of other ways as well. Because of this, and because
user-visible behavior changes in minor releases are to be avoided
whenever possible, no back-patch.

Discussion: http://postgr.es/m/CA+TgmobG_YUP06R_PM_2Z7wR0qv_52gQPHD8CYXbJva0cf0E+A@mail.gmail.com

Branch
------
master

Details
-------
https://git.postgresql.org/pg/commitdiff/48a257d444a787941ba3da24d65e6cbe31461d0a

Modified Files
--------------
src/backend/catalog/aclchk.c | 11 ++++-------
1 file changed, 4 insertions(+), 7 deletions(-)


В списке pgsql-committers по дате отправления:

Предыдущее
От: Robert Haas
Дата:
Сообщение: pgsql: walmethods.c/h: Make WalWriteMethod more object-oriented.
Следующее
От: Peter Eisentraut
Дата:
Сообщение: pgsql: Fix icu tests with C locale