-
- Downloads
Prevent privilege escalation in explicit calls to PL validators.
The primary role of PL validators is to be called implicitly during CREATE FUNCTION, but they are also normal functions that a user can call explicitly. Add a permissions check to each validator to ensure that a user cannot use explicit validator calls to achieve things he could not otherwise achieve. Back-patch to 8.4 (all supported versions). Non-core procedural language extensions ought to make the same two-line change to their own validators. Andres Freund, reviewed by Tom Lane and Noah Misch. Security: CVE-2014-0061
Showing
- doc/src/sgml/plhandler.sgml 4 additions, 1 deletiondoc/src/sgml/plhandler.sgml
- src/backend/catalog/pg_proc.c 9 additions, 0 deletionssrc/backend/catalog/pg_proc.c
- src/backend/commands/functioncmds.c 0 additions, 1 deletionsrc/backend/commands/functioncmds.c
- src/backend/utils/fmgr/fmgr.c 84 additions, 0 deletionssrc/backend/utils/fmgr/fmgr.c
- src/include/fmgr.h 1 addition, 0 deletionssrc/include/fmgr.h
- src/pl/plperl/plperl.c 4 additions, 0 deletionssrc/pl/plperl/plperl.c
- src/pl/plpgsql/src/pl_handler.c 3 additions, 0 deletionssrc/pl/plpgsql/src/pl_handler.c
- src/pl/plpython/plpy_main.c 4 additions, 0 deletionssrc/pl/plpython/plpy_main.c
Loading
Please register or sign in to comment