Re: [HACKERS] CurrentUserId may be invalid during the rest of a session

Поиск
Список
Период
Сортировка
От Robert Haas
Тема Re: [HACKERS] CurrentUserId may be invalid during the rest of a session
Дата
Msg-id CA+TgmoaCD5oLpq4+QDA0b5-cnBExZ2C+sgL1tzUf4BGK6rOCKA@mail.gmail.com
обсуждение исходный текст
Ответ на [HACKERS] CurrentUserId may be invalid during the rest of a session  (Richard Guo <guofenglinux@gmail.com>)
Список pgsql-hackers
On Thu, Aug 31, 2017 at 6:02 AM, Richard Guo <guofenglinux@gmail.com> wrote:
> Is this expected behavior?

I don't think so.  My impression after brief research is that this is
a bug introduced here:

Author: Tom Lane <tgl@sss.pgh.pa.us>
Branch: master Release: REL8_3_0 [eedb068c0] 2008-01-03 21:23:15 +0000
Branch: REL8_2_STABLE Release: REL8_2_6 [3af35f8d4] 2008-01-03 21:23:45 +0000
Branch: REL8_1_STABLE Release: REL8_1_11 [46cf9c260] 2008-01-03 21:24:26 +0000
Branch: REL8_0_STABLE Release: REL8_0_15 [108b19d86] 2008-01-03 21:25:00 +0000
Branch: REL7_4_STABLE Release: REL7_4_19 [230d5cfc4] 2008-01-03 21:25:34 +0000
Branch: REL7_3_STABLE Release: REL7_3_21 [218cf59b6] 2008-01-03 21:25:58 +0000
   Make standard maintenance operations (including VACUUM, ANALYZE, REINDEX,   and CLUSTER) execute as the table owner
ratherthan the calling user, using   the same privilege-switching mechanism already used for SECURITY DEFINER
functions. The purpose of this change is to ensure that user-defined   functions used in index definitions cannot
acquirethe privileges of a   superuser account that is performing routine maintenance.  While a function   used in an
indexis supposed to be IMMUTABLE and thus not able to
 
do anything   very interesting, there are several easy ways around that restriction; and   even if we could plug them
all,there would remain a risk of
 
reading sensitive   information and broadcasting it through a covert channel such as CPU usage.
   To prevent bypassing this security measure, execution of SET SESSION   AUTHORIZATION and SET ROLE is now forbidden
withina SECURITY
 
DEFINER context.
   Thanks to Itagaki Takahiro for reporting this vulnerability.
   Security: CVE-2007-6600

-- 
Robert Haas
EnterpriseDB: http://www.enterprisedb.com
The Enterprise PostgreSQL Company



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Tom Lane
Дата:
Сообщение: Re: [HACKERS] OpenFile() Permissions Refactor
Следующее
От: Robert Haas
Дата:
Сообщение: Re: [HACKERS] path toward faster partition pruning