]> granicus.if.org Git - postgresql/commit
Make standard maintenance operations (including VACUUM, ANALYZE, REINDEX,
authorTom Lane <tgl@sss.pgh.pa.us>
Thu, 3 Jan 2008 21:23:15 +0000 (21:23 +0000)
committerTom Lane <tgl@sss.pgh.pa.us>
Thu, 3 Jan 2008 21:23:15 +0000 (21:23 +0000)
commiteedb068c0a7474fb11d67d03b0a9e1ded5df82c4
tree1e5a19e0970f87fea7d5e2d243d5614318229f79
parent98f27aaef34291246c09ce5d0e0fba4f4477467a
Make standard maintenance operations (including VACUUM, ANALYZE, REINDEX,
and CLUSTER) execute as the table owner rather than the calling user, using
the same privilege-switching mechanism already used for SECURITY DEFINER
functions.  The purpose of this change is to ensure that user-defined
functions used in index definitions cannot acquire the privileges of a
superuser account that is performing routine maintenance.  While a function
used in an index is supposed to be IMMUTABLE and thus not able to do anything
very interesting, there are several easy ways around that restriction; and
even if we could plug them all, there would remain a risk of reading sensitive
information and broadcasting it through a covert channel such as CPU usage.

To prevent bypassing this security measure, execution of SET SESSION
AUTHORIZATION and SET ROLE is now forbidden within a SECURITY DEFINER context.

Thanks to Itagaki Takahiro for reporting this vulnerability.

Security: CVE-2007-6600
13 files changed:
doc/src/sgml/ref/set_role.sgml
doc/src/sgml/ref/set_session_auth.sgml
doc/src/sgml/ref/show.sgml
src/backend/access/transam/xact.c
src/backend/catalog/index.c
src/backend/commands/analyze.c
src/backend/commands/schemacmds.c
src/backend/commands/vacuum.c
src/backend/commands/variable.c
src/backend/utils/adt/ri_triggers.c
src/backend/utils/fmgr/fmgr.c
src/backend/utils/init/miscinit.c
src/include/miscadmin.h